Windows Server 2012 / 2012 R2 Member Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +26 −11 ⚠ 2 ✎ 119
Comparison against the immediately-prior release (V1R5). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 26
- V-15715 Medium The system must be configured to generate error reports.
- V-56511 Medium The Windows Error Reporting Service must be running and configured to start automatically.
- V-57453 Medium The system must be configured to collect multiple error reports of the same event type.
- V-57455 Medium The system must be configured to prevent the display of error messages to the user.
- V-57457 Medium The system must be configured to store error reports locally, on the system or in the enclave, and not send them to Microsoft.
- V-57459 Medium The system must be configured to use SSL to forward error reports.
- V-57461 Medium The system must be configured to send error reports on TCP port 1232.
- V-57463 Medium The system must be configured to archive error reports.
- V-57465 Medium The system must be configured to store all data in the error report archive.
- V-57467 Medium The maximum number of error reports to archive on a system must be configured to 100 or greater.
- V-57469 Medium The system must be configured to queue error reports until a local or DOD-wide collector is available.
- V-57471 Medium The system must be configured to add all error reports to the queue.
- V-57473 Medium The maximum number of error reports to queue on a system must be configured to 50 or greater.
- V-57475 Medium The system must be configured to attempt to forward queued error reports once a day.
- V-57477 Medium The system must be configured to automatically consent to send all data requested by a local or DOD-wide error collection site.
- V-57479 Medium The system must be configured to permit the default consent levels of Windows Error Reporting to override any other consent policy setting.
- V-57633 Medium The system must be configured to audit Policy Change - Authorization Policy Change successes.
- V-57635 Medium The system must be configured to audit Policy Change - Authorization Policy Change failures.
- V-57637 High The operating system must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
- V-57639 Medium Users must be required to enter a password to access private keys stored on the computer.
- V-57641 Medium Protection methods such as TLS, encrypted VPNs, or IPSEC must be implemented if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
- V-57645 Medium Systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
- V-57653 Medium The operating system must automatically remove or disable temporary user accounts after 72 hours.
- V-57655 Medium The operating system must be configured such that emergency administrator accounts are never automatically removed or disabled.
- V-57719 Medium The operating system must, at a minimum, off-load audit records of interconnected systems in real time and off-load standalone systems weekly.
- V-57721 Medium Event Viewer must be protected from unauthorized modification and deletion.
Removed rules 11
- V-1148 Low Local users must not exist on a system in a domain.
- V-14250 Medium Automatic Updates must not be used (unless configured to point to a DoD server).
- V-3471 Medium The system must be configured to prevent automatic forwarding of error information.
- V-36701 Medium The Enhanced Mitigation Experience Toolkit (EMET) system-wide Address Space Layout Randomization (ASLR) must be enabled and configured to Application Opt In.
- V-36702 Medium The Enhanced Mitigation Experience Toolkit (EMET) Default Protections for Internet Explorer must be enabled.
- V-36703 Medium The Enhanced Mitigation Experience Toolkit (EMET) Default Protections for Recommended Software must be enabled.
- V-36704 Medium The Enhanced Mitigation Experience Toolkit (EMET) Default Protections for Popular Software must be enabled.
- V-36705 Medium The Enhanced Mitigation Experience Toolkit (EMET) system-wide Data Execution Prevention (DEP) must be enabled and configured to at least Application Opt Out.
- V-36706 Medium The Enhanced Mitigation Experience Toolkit (EMET) system-wide Structured Exception Handler Overwrite Protection (SEHOP) must be configured to Application Opt Out.
- V-39137 Medium The Enhanced Mitigation Experience Toolkit (EMET) V4.1 Update 1 or later must be installed on the system.
- V-43246 Low Windows Update must not connect to any Internet locations. (Windows 2012 R2)
Severity changes 2
Content changes 119
- V-1073 High description Systems must be maintained at a supported service pack level.
- V-1074 High descriptioncheckfix An approved DoD antivirus program must be installed and used.
- V-1076 Low checkfix System-level information must be backed up in accordance with local recovery time and recovery point objectives.
- V-1080 Medium description Global object access auditing of the file system must be configured to record failures.
- V-1081 High check Local volumes must be formatted using NTFS.
- V-1090 Low descriptioncheckfix Caching of logon credentials must be limited.
- V-1098 Medium description The period of time before the bad logon counter is reset must meet minimum requirements.
- V-1102 High description Unauthorized accounts must not have the Act as part of the operating system user right.
- V-1105 Medium description The minimum password age must meet requirements.
- V-1121 High description FTP servers must be configured to prevent access to the system drive.
- V-1141 Medium descriptioncheckfix Unencrypted passwords must not be sent to third-party SMB Servers.
- V-1151 Low description The print driver installation privilege must be restricted to administrators.
- V-1152 High description Anonymous access to the registry must be restricted.
- V-1153 High description The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.
- V-1155 Medium checkfix The Deny access to this computer from the network user right on member servers must be configured to prevent access from highly privileged domain accounts and local administrator accounts on domain systems, and from unauthenticated access on all systems.
- V-1157 Medium check The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
- V-1158 Low checkfix The Recovery Console SET command must be disabled.
- V-1159 High description The Recovery Console option must be set to prevent automatic logon to the system.
- V-1163 Medium description Outgoing secure channel traffic must be encrypted when possible.
- V-1165 Low description The computer account password must not be prevented from being reset.
- V-1168 Medium check Members of the Backup Operators group must be documented.
- V-1174 Low checkfix The amount of idle time required before suspending a session must be properly set.
- V-14234 Medium description User Account Control approval mode for the built-in Administrator must be enabled.
- V-14236 Medium description User Account Control must automatically deny standard user requests for elevation.
- V-14242 Medium description User Account Control must virtualize file and registry write failures to per-user locations.
- V-14253 Medium check Unauthenticated RPC clients must be restricted from connecting to the RPC server.
- V-14254 Medium checkfix Client computers must be required to authenticate for RPC communication.
- V-15680 Low checkfix The classic logon screen must be required for user logons.
- V-15713 Medium descriptioncheckfix Microsoft Active Protection Service membership must be disabled.
- V-15719 Low checkfix Users must be notified if the logon server was inaccessible and cached credentials were used.
- V-15823 Medium check Software certificate installation files must be removed from a system.
- V-16008 Medium description Windows must elevate all applications in User Account Control, not just signed ones.
- V-18010 High description Unauthorized accounts must not have the Debug programs user right.
- V-21954 Medium descriptioncheckfix The use of DES encryption suites must not be allowed for Kerberos encryption.
- V-21955 Low check IPv6 source routing must be configured to the highest protection level.
- V-21956 Low checkfix IPv6 TCP data retransmissions must be configured to prevent resources from becoming exhausted.
- V-21964 Low checkfix Device metadata retrieval from the Internet must be prevented.
- V-21973 High description Autoplay must be turned off for non-volume devices.
- V-22692 High description The default Autorun behavior must be configured to prevent Autorun commands.
- V-2372 High description Reversible password encryption must be disabled.
- V-2374 High description Autoplay must be disabled for all drives.
- V-26070 High description Standard user accounts must only have Read permissions to the Winlogon registry key.
- V-26470 Medium description Unauthorized accounts must not have the Access this computer from the network user right on member servers.
- V-26471 Medium description Unauthorized accounts must not have the Adjust memory quotas for a process user right.
- V-26472 Medium description Unauthorized accounts must not have the Allow log on locally user right.
- V-26474 Medium description Unauthorized accounts must not have the back up files and directories user right.
- V-26475 Low description Unauthorized accounts must not have the Bypass traverse checking user right.
- V-26479 High description Unauthorized accounts must not have the Create a token object user right.
- V-26480 Medium description Unauthorized accounts must not have the Create global objects user right.
- V-26482 Medium checkfix Unauthorized accounts must not have the Create symbolic links user right.
- V-26486 Medium checkfix The Deny log on through Remote Desktop Services user right on member servers must be configured to prevent access from highly privileged domain accounts and local administrator accounts on domain systems, and from unauthenticated access on all systems.
- V-26489 Medium description Unauthorized accounts must not have the Generate security audits user right.
- V-26490 Medium description Unauthorized accounts must not have the Impersonate a client after authentication user right.
- V-26492 Medium description Unauthorized accounts must not have the Increase scheduling priority user right.
- V-26494 Medium description Unauthorized accounts must not have the Lock pages in memory user right.
- V-26495 Medium description Unauthorized accounts must not have the Log on as a batch job user right.
- V-26503 Medium description Unauthorized accounts must not have the Replace a process level token user right.
- V-26504 Medium description Unauthorized accounts must not have the Restore files and directories user right.
- V-26506 Medium description Unauthorized accounts must not have the Take ownership of files or other objects user right.
- V-26529 Medium description The system must be configured to audit Account Logon - Credential Validation successes.
- V-26536 Medium description The system must be configured to audit Account Management - Security Group Management failures.
- V-26537 Medium description The system must be configured to audit Account Management - User Account Management successes.
- V-26538 Medium description The system must be configured to audit Account Management - User Account Management failures.
- V-26542 Medium description The system must be configured to audit Logon/Logoff - Logon failures.
- V-26543 Medium description The system must be configured to audit Logon/Logoff - Special Logon successes.
- V-26545 Medium description The system must be configured to audit Object Access - Registry failures.
- V-26546 Medium description The system must be configured to audit Policy Change - Audit Policy Change successes.
- V-26547 Medium description The system must be configured to audit Policy Change - Audit Policy Change failures.
- V-26550 Medium description The system must be configured to audit Privilege Use - Sensitive Privilege Use failures.
- V-26553 Medium description The system must be configured to audit System - Security State Change successes.
- V-26554 Medium description The system must be configured to audit System - Security State Change failures.
- V-26555 Medium description The system must be configured to audit System - Security System Extension successes.
- V-26557 Medium description The system must be configured to audit System - System Integrity successes.
- V-26558 Medium description The system must be configured to audit System - System Integrity failures.
- V-32274 Medium description The DoD Interoperability Root CA 1 to DoD Root CA 2 cross-certificate must be installed into the Untrusted Certificates Store.
- V-32282 High description Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key.
- V-3245 Medium check File shares must limit access to data on a system.
- V-3289 Medium check Servers must have a host-based Intrusion Detection System.
- V-3338 High check Named pipes that can be accessed anonymously must be configured to contain no values on member servers.
- V-3339 High check Unauthorized remotely accessible registry paths must not be configured.
- V-3340 High description Network shares that can be accessed anonymously must not be allowed.
- V-3373 Low description The maximum age for machine account passwords must be set to requirements.
- V-3377 Medium description The system must be configured to prevent anonymous users from having the same rights as the Everyone group.
- V-3382 Medium description The system must be configured to meet the minimum session security requirement for NTLM SSP-based clients.
- V-3383 Medium description The system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
- V-3472 Low check If the time service is configured, it must use an authorized time server.
- V-3487 Medium check Necessary services must be documented to maintain a baseline to determine if additional, unnecessary services have been added to a system.
- V-36656 Medium check A screen saver must be enabled on the system.
- V-36658 Medium check Users with administrative privilege must be documented.
- V-36663 Medium checkfix System BIOS or system controllers must have administrator accounts/passwords configured.
- V-36664 High checkfix The system must not use removable media as the boot loader.
- V-36667 Medium description The system must be configured to audit Object Access - Removable Storage failures.
- V-36668 Medium description The system must be configured to audit Object Access - Removable Storage successes.
- V-36669 Medium description The system must be configured to audit Object Access - Handle Manipulation failures.
- V-36670 Medium description Audit data must be reviewed on a regular basis.
- V-36672 Medium descriptioncheckfix Audit records must be backed up onto a different system or media than the system being audited.
- V-36696 Low description The detection of compatibility issues for applications and drivers must be turned off.
- V-36707 Low description The Windows SmartScreen must be turned off.
- V-36708 Medium check The location feature must be turned off.
- V-36710 Low checkfix Automatic download of updates from the Windows Store must be turned off.
- V-36711 Medium checkfix The Windows Store application must be turned off.
- V-36733 Low checkfix User-level information must be backed up in accordance with local recovery time and recovery point objectives.
- V-36734 Medium descriptioncheckfix The operating system must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
- V-36736 Medium description The system must query the certification authority to determine whether a public key certificate has been revoked before accepting the certificate for authentication purposes.
- V-36772 Medium description The machine account lockout threshold must be set to 10 on systems with BitLocker enabled.
- V-40173 Low checkfix System-related documentation must be backed up in accordance with local recovery time and recovery point objectives.
- V-40178 Medium description Permissions for system drive root directory (usually C:\) must conform to minimum requirements.
- V-40195 Medium checkfix System BIOS or system controllers must not allow user-level access.
- V-40200 Medium description The system must be configured to audit Object Access - Central Access Policy Staging failures.
- V-40202 Medium description The system must be configured to audit Object Access - Central Access Policy Staging successes.
- V-40237 Medium description The US DoD CCEB Interoperability Root CA 1 to DoD Root CA 2 cross-certificate must be installed into the Untrusted Certificates Store.
- V-4116 Low checkfix The system must be configured to ignore NetBIOS name release requests except from WINS servers.
- V-43239 Medium descriptioncheckfix Command line data must be prevented from inclusion in process creation events (Windows 2012 R2).
- V-4438 Low checkfix The system must limit how many times unacknowledged TCP data is retransmitted.
- V-4443 High descriptioncheck Unauthorized remotely accessible registry paths and sub-paths must not be configured.
- V-45589 Low descriptioncheckfix A group must be defined on domain systems to include all local administrator accounts.
- V-6836 Medium description Passwords must, at a minimum, be 14 characters.
- V-6840 Medium descriptionfix System mechanisms must be implemented to enforce automatic expiration of passwords.
- V-7002 High description Accounts must require passwords.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-00-000001
- Vuln IDs
-
- V-1070
- Rule IDs
-
- SV-52838r1_rule
Checks: C-47155r1_chk
Verify servers are located in controlled access areas that are accessible only to authorized personnel. If systems are not adequately protected, this is a finding.
Fix: F-45764r1_fix
Ensure servers are located in secure, access-controlled areas.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- WN12-00-000012
- Vuln IDs
-
- V-1072
- Rule IDs
-
- SV-52839r1_rule
Checks: C-47156r2_chk
Determine whether any shared accounts exist. If no shared accounts exist, this is NA. If shared accounts exist, this is a finding.
Fix: F-45765r1_fix
Remove any shared accounts from the system.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-GE-000001
- Vuln IDs
-
- V-1073
- Rule IDs
-
- SV-53189r2_rule
Checks: C-47495r1_chk
Run "winver.exe". If the "About Windows" dialog box does not display "Microsoft Windows Server Version 6.2 (Build 9200)" or greater, this is a finding. No preview versions will be used in a production environment. Unsupported Service Packs/Releases: Windows 2012 - any release candidates or versions prior to the initial release.
Fix: F-46115r1_fix
Update the system to a supported release or service pack level.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-GE-000002
- Vuln IDs
-
- V-1074
- Rule IDs
-
- SV-52103r2_rule
Checks: C-61993r1_chk
Verify a supported DoD antivirus product has been installed on the system. If McAfee VirusScan Enterprise 8.8 Patch 3 or later is not installed on the system, this is a finding.
Fix: F-66889r1_fix
Install McAfee VirusScan Enterprise 8.8 Patch 3 or later on the system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000073
- Vuln IDs
-
- V-1075
- Rule IDs
-
- SV-52840r1_rule
Checks: C-47157r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: ShutdownWithoutLogon Value Type: REG_DWORD Value: 0
Fix: F-45766r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Shutdown: Allow system to be shutdown without having to log on" to "Disabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-00-000014
- Vuln IDs
-
- V-1076
- Rule IDs
-
- SV-52841r2_rule
Checks: C-58957r1_chk
Determine whether system-level information is backed up in accordance with local recovery time and recovery point objectives. If system-level information is not backed up in accordance with local recovery time and recovery point objectives, this is a finding.
Fix: F-63413r2_fix
Implement system-level information backups in accordance with local recovery time and recovery point objectives.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000114
- Vuln IDs
-
- V-1080
- Rule IDs
-
- SV-52842r2_rule
Checks: C-47159r2_chk
If "Object Access -> File System" auditing is not properly configured (V-26544), or if drives are not formatted with NTFS (V-1081), this is a finding. If "Global Object Access Auditing" of the file system has not been configured to audit all failed access attempts for the "Everyone" group, this is a finding. Use the AuditPol tool to review the current configuration. Open a Command Prompt with elevated privileges ("Run as Administrator"). Enter "Auditpol /resourceSACL /type:File /view". ("File" in the /type parameter is case sensitive). The following results should be displayed: Entry: 1 Resource Type: File User: Everyone Flags: Failure Condition: <null> Accesses: FILE_READ_DATA FILE_WRITE_DATA FILE_APPEND_DATA FILE_READ_EA FILE_WRITE_EA FILE_EXECUTE FILE_DELETE_CHILD FILE_READ_ATTRIBUTES FILE_WRITE_ATTRIBUTES DELETE READ_CONTROL WRITE_DAC WRITE_OWNER The command was successfully executed.
Fix: F-45768r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Global Object Access Auditing -> "File system" with the following: Principal: Everyone Type: Fail Permissions: all categories selected If this is configured on a domain controller, in local or group policy, do not set any conditions limiting the scope.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- WN12-GE-000005
- Vuln IDs
-
- V-1081
- Rule IDs
-
- SV-52843r2_rule
Checks: C-47160r3_chk
Open the Computer Management Console. Expand the "Storage" object in the Tree window. Select the "Disk Management" object. If the file system column does not indicate "NTFS" as the file system for each local hard drive, this is a finding. Some hardware vendors create a small FAT partition to store troubleshooting and recovery data. No other files must be stored here. This must be documented with the ISSO.
Fix: F-45769r1_fix
Format all partitions/drives to use NTFS.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000116
- Vuln IDs
-
- V-1088
- Rule IDs
-
- SV-52844r2_rule
Checks: C-47161r2_chk
If "Object Access -> Registry" auditing is not properly configured (V-26545), this is a finding. If "Global Object Access Auditing" of the registry has not been configured to audit all failed access attempts for the "Everyone" group, this is a finding. Use the AuditPol tool to review the current configuration. Open a Command Prompt with elevated privileges ("Run as Administrator"). Enter "Auditpol /resourceSACL /type:Key /view". ("Key" in the /type parameter is case sensitive). The following results should be displayed: Entry: 1 Resource Type: Key User: Everyone Flags: Failure Condition <null> Accesses: KEY_ALL_ACCESS
Fix: F-45770r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Global Object Access Auditing -> "Registry" with the following: Principal: Everyone Type: Fail Permissions: all categories selected
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- WN12-SO-000022
- Vuln IDs
-
- V-1089
- Rule IDs
-
- SV-52845r2_rule
Checks: C-47162r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: LegalNoticeText Value Type: REG_SZ Value: See message text below You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. Any OS versions that do not support the full text version must state the following: "I've read & consent to terms in IS user agreem't." Deviations are not permitted except as authorized by the Deputy Assistant Secretary of Defense for Information and Identity Assurance.
Fix: F-45771r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Interactive Logon: Message text for users attempting to log on" to the following: You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000024
- Vuln IDs
-
- V-1090
- Rule IDs
-
- SV-52846r2_rule
Checks: C-61743r2_chk
If the system is not a member of a domain, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ Value Name: CachedLogonsCount Value Type: REG_SZ Value: 4 (or less)
Fix: F-66507r2_fix
If the system is not a member of a domain, this is NA. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Number of previous logons to cache (in case Domain Controller is not available)" to "4" logons or less.
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN12-SO-000052
- Vuln IDs
-
- V-1093
- Rule IDs
-
- SV-52847r1_rule
Checks: C-47164r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: RestrictAnonymous Value Type: REG_DWORD Value: 1
Fix: F-45773r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Do not allow anonymous enumeration of SAM accounts and shares" to "Enabled".
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN12-AC-000002
- Vuln IDs
-
- V-1097
- Rule IDs
-
- SV-52848r1_rule
Checks: C-47165r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Account Lockout Policy. If the "Account lockout threshold" is "0" or more than "3" attempts, this is a finding.
Fix: F-45774r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Account Lockout Policy -> "Account lockout threshold" to "3" or less invalid logon attempts (excluding "0" which is unacceptable).
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN12-AC-000003
- Vuln IDs
-
- V-1098
- Rule IDs
-
- SV-52849r1_rule
Checks: C-47166r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Account Lockout Policy. If the "Reset account lockout counter after" value is less than "60" minutes, this is a finding.
Fix: F-45775r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Account Lockout Policy -> "Reset account lockout counter after" to at least "60" minutes.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- WN12-AC-000001
- Vuln IDs
-
- V-1099
- Rule IDs
-
- SV-52850r1_rule
Checks: C-47167r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Account Lockout Policy. If the "Account lockout duration" is not set to "0", requiring an administrator to unlock the account, this is a finding.
Fix: F-45776r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Account Lockout Policy -> "Account lockout duration" to "0" minutes, "Account is locked out until administrator unlocks it".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN12-UR-000003
- Vuln IDs
-
- V-1102
- Rule IDs
-
- SV-52108r2_rule
Checks: C-46925r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups (to include administrators), are granted the "Act as part of the operating system" user right, this is a finding.
Fix: F-45133r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Act as part of the operating system" to be defined but containing no entries (blank).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- WN12-AC-000005
- Vuln IDs
-
- V-1104
- Rule IDs
-
- SV-52851r1_rule
Checks: C-47168r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy. If the value for the "Maximum password age" is greater than "60" days, this is a finding. If the value is set to "0" (never expires), this is a finding.
Fix: F-45777r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy -> "Maximum password age" to "60" days or less (excluding "0" which is unacceptable).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- WN12-AC-000006
- Vuln IDs
-
- V-1105
- Rule IDs
-
- SV-52852r1_rule
Checks: C-47169r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy. If the value for the "Minimum password age" is set to "0" days ("Password can be changed immediately."), this is a finding.
Fix: F-45778r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy -> "Minimum password age" to at least "1" day.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- WN12-AC-000004
- Vuln IDs
-
- V-1107
- Rule IDs
-
- SV-52853r1_rule
Checks: C-47170r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy. If the value for "Enforce password history" is less than "5" passwords remembered, this is a finding.
Fix: F-45779r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy -> "Enforce password history" to "5" (or more) passwords remembered.
- RMF Control
- IA-4
- Severity
- L
- CCI
- CCI-000795
- Version
- WN12-GE-000014
- Vuln IDs
-
- V-1112
- Rule IDs
-
- SV-52854r2_rule
Checks: C-47171r2_chk
Run the DUMPSEC utility. Select "Dump Users as Table" from the "Report" menu. Select the following fields, and click "Add" for each entry: UserName SID LastLogonTime AcctDisabled Review the "LastLogonTime". If any enabled accounts have not been logged into within the past 35 days, this is a finding. The following accounts are exempt: Built-in administrator account (SID ending in 500) Built-in guest account (SID ending in 501) Application accounts Disabled accounts The following PowerShell command may be used on domain controllers to list inactive accounts: Search-ADAccount -AccountInactive -UsersOnly -TimeSpan 35.00:00:00 Review the list to determine the validity for each account reported.
Fix: F-45780r1_fix
Regularly review accounts to determine if they are still active. Remove or disable accounts that have not been used in the last 35 days.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- WN12-SO-000003
- Vuln IDs
-
- V-1113
- Rule IDs
-
- SV-52855r1_rule
Checks: C-47172r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options. If the value for "Accounts: Guest account status" is not set to "Disabled", this is a finding.
Fix: F-45781r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Accounts: Guest account status" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000006
- Vuln IDs
-
- V-1114
- Rule IDs
-
- SV-52856r1_rule
Checks: C-47173r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options. If the value for "Accounts: Rename guest account" is not set to a value other than "Guest", this is a finding.
Fix: F-45782r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Accounts: Rename guest account" to a name other than "Guest".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000005
- Vuln IDs
-
- V-1115
- Rule IDs
-
- SV-52857r1_rule
Checks: C-47174r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options. If the value for "Accounts: Rename administrator account" is not set to a value other than "Administrator", this is a finding.
Fix: F-45783r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Accounts: Rename administrator account" to a name other than "Administrator".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-GE-000010
- Vuln IDs
-
- V-1119
- Rule IDs
-
- SV-52858r1_rule
Checks: C-47175r2_chk
Verify the local system boots directly into Windows. Open Control Panel. Select "System". Select the "Advanced System Settings" link. Select the "Advanced" tab. Click the "Startup and Recovery" Settings button. If the drop-down list box "Default operating system:" shows any operating system other than Windows Server 2012, this is a finding.
Fix: F-45784r1_fix
Ensure Windows Server 2012 is the only operating system installed for the system to boot into. Remove alternate operating systems.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-GE-000026
- Vuln IDs
-
- V-1120
- Rule IDs
-
- SV-52106r1_rule
Checks: C-46923r1_chk
If FTP is not installed on the system, this is NA. Open a "Command Prompt". Attempt to log on as the user "anonymous" with the following commands: C:\>ftp localhost (Connected to "servername". 220 Microsoft FTP Service) User: anonymous (331 Anonymous access allowed, send identity (e-mail name) as password.) Password: password (230 User logged in.) ftp> If the command response indicates that an anonymous FTP login was permitted, this is a finding.
Fix: F-45131r1_fix
Configure the system to prevent an installed FTP service from allowing anonymous logons.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-GE-000027
- Vuln IDs
-
- V-1121
- Rule IDs
-
- SV-52212r1_rule
Checks: C-46958r1_chk
If FTP is not installed on the system, this is NA. Open a "Command Prompt". Log on using an authenticated FTP account, and attempt to access the root of the boot drive with the following commands: X:\>ftp 127.0.0.1 (Connected to "servername". 220 "servername" Microsoft FTP Service (Version 2.0).) User: "ftpuser" (331 Password required for ftpuser.) Password: "password" (230 User ftpuser logged in.) ftp> dir If the FTP session indicates access to areas of the operating system such as Program Files and Windows directories, this is a finding.
Fix: F-45231r1_fix
Configure the system to prevent an FTP service from allowing access to the system drive.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN12-GE-000004-MS
- Vuln IDs
-
- V-1127
- Rule IDs
-
- SV-51511r3_rule
Checks: C-54671r1_chk
Review the local Administrators group. Only the appropriate administrator groups or accounts responsible for administration of the system may be members of the group. For domain-joined member servers, the Domain Admins group must be replaced by a domain member server administrator group. Systems dedicated to the management of Active Directory (AD admin platforms, see V-36436 in the Active Directory Domain STIG) are exempt from this. AD admin platforms may use the Domain Admins group or a domain administrative group created specifically for AD admin platforms (see V-43711 in the Active Directory Domain STIG). Standard user accounts must not be members of the local Administrator group. If prohibited accounts are members of the local Administrators group, this is a finding. The built-in Administrator account or other required administrative accounts would not be a finding.
Fix: F-58527r1_fix
Configure the system to include only administrator groups or accounts that are responsible for the system in the local Administrators group. For domain-joined member servers, replace the Domain Admins group with a domain member server administrator group. Systems dedicated to the management of Active Directory (AD admin platforms, see V-36436 in the Active Directory Domain STIG) are exempt from this. AD admin platforms may use the Domain Admins group or a domain administrative group created specifically for AD admin platforms (see V-43711 in the Active Directory Domain STIG). Remove any standard user accounts.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-00-000013
- Vuln IDs
-
- V-1128
- Rule IDs
-
- SV-52859r2_rule
Checks: C-47176r2_chk
Verify security configuration tools or equivalent processes are being used to configure Windows systems to meet security requirements. If security configuration tools or equivalent processes are not used, this is a finding. Security configuration tools that are integrated into Windows, such as Group Policies and Security Templates, may be used to configure platforms for security compliance. If an alternate method is used to configure a system (e.g., manually using the DISA Windows Security STIGs, etc.) and the same configured result is achieved, this is acceptable.
Fix: F-45785r1_fix
Implement a process using security configuration tools or the equivalent to configure Windows systems to meet security requirements.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- WN12-GE-000009
- Vuln IDs
-
- V-1131
- Rule IDs
-
- SV-52104r1_rule
Checks: C-46921r2_chk
Verify password complexity software that requires a case-sensitive character mix of at least one of each of uppercase letters, lowercase letters, numbers, and special characters is installed and enforced . If password complexity software that enforces a case-sensitive character mix of at least one of each of uppercase letters, lowercase letters, numbers, and special characters is not installed, this is a finding. The enpasflt password filter is available as an option on the IASE website in the Windows Support Files area (PKI required - http://iase.disa.mil/stigs/os/windows/support_files.html). It must be tested for the particular environment. If it does not function properly or causes issues, the site will be responsible for obtaining other password complexity software to meet the requirements. The current available versions are: Name - Modified Date EnPasFltV2x86.dll - 3/21/2011 EnPasFltV2x64.dll - 3/21/2011 If another product, such as PPE, or a different version of enpasflt is used, the SA must demonstrate that it is configured to enforce the DoD requirements. For the enpasflt password filter to function properly, verify the following: -The appropriate version of the file will be located in %systemroot%\system32. -The Date Modified should be 3/21/2011. -The "Notification Packages" value under registry key "HKLM\System\CurrentControlSet\Control\LSA" must include the file name (e.g., "EnPasFltV2x86"). Note: If a password filter is not used, the site is still responsible for requiring full compliance with DoD policy, even though the password complexity setting does not enforce the 4-character type rule.
Fix: F-45129r1_fix
Install password complexity software and configure it to enforce the required DoD standards of a case sensitive mix of at least one of each of uppercase letters, lowercase letters, numbers, and special characters. If the enpasflt password filter is used: -Copy the appropriate version to %systemroot%\system32. -Add the file name (e.g., "EnPasFltV2x86") to the "Notification Packages" value under registry key "HKLM\System\CurrentControlSet\Control\LSA". -Restart the system.
- RMF Control
- AC-3
- Severity
- L
- CCI
- CCI-000213
- Version
- WN12-GE-000012
- Vuln IDs
-
- V-1135
- Rule IDs
-
- SV-52213r1_rule
Checks: C-46959r1_chk
Open "Devices and Printers" in Control Panel or through Search. If there are no printers configured, this is NA. For each configured printer: Right click on the printer. Select "Printer Properties". Select the "Sharing" tab. View whether "Share this printer" is checked. For any printers with "Share this printer" selected: Select the Security tab. If any standard user accounts or groups have permissions other than "Print", this is a finding. Standard users will typically be given "Print" permission through the Everyone group. "All APPLICATION PACKAGES" and "CREATOR OWNER" are not considered standard user accounts for this requirement.
Fix: F-45232r1_fix
Configure the permissions on shared printers to restrict standard users to only have Print permissions. This is typically given through the Everyone group by default.
- RMF Control
- SC-10
- Severity
- L
- CCI
- CCI-001133
- Version
- WN12-SO-000034
- Vuln IDs
-
- V-1136
- Rule IDs
-
- SV-52860r1_rule
Checks: C-47177r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\LanManServer\Parameters\ Value Name: EnableForcedLogoff Value Type: REG_DWORD Value: 1
Fix: F-45786r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Microsoft network server: Disconnect clients when logon hours expire" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- WN12-SO-000030
- Vuln IDs
-
- V-1141
- Rule IDs
-
- SV-52861r2_rule
Checks: C-47178r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters\ Value Name: EnablePlainTextPassword Value Type: REG_DWORD Value: 0
Fix: F-45787r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft Network Client: Send unencrypted password to third-party SMB servers" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000036
- Vuln IDs
-
- V-1145
- Rule IDs
-
- SV-52107r2_rule
Checks: C-46924r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ Value Name: AutoAdminLogon Type: REG_SZ Value: 0
Fix: F-45132r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)" to "Disabled". Ensure no passwords are stored in the "DefaultPassword" registry value noted below: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ Value Name: DefaultPassword (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000192
- Version
- WN12-AC-000008
- Vuln IDs
-
- V-1150
- Rule IDs
-
- SV-52863r1_rule
Checks: C-47180r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy. If the value for "Password must meet complexity requirements" is not set to "Enabled", this is a finding. If the site is using a password filter that requires this setting be set to "Disabled" for the filter code to be used, this would not be considered a finding. If this setting does not affect the use of an external password filter, it will be enabled for fall-back purposes.
Fix: F-45789r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy -> "Password must meet complexity requirements" to "Enabled".
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- WN12-SO-000089
- Vuln IDs
-
- V-1151
- Rule IDs
-
- SV-52214r2_rule
Checks: C-46960r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Print\Providers\LanMan Print Services\Servers\ Value Name: AddPrinterDrivers Value Type: REG_DWORD Value: 1
Fix: F-45233r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Devices: Prevent users from installing printer drivers" to "Enabled".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN12-RG-000004
- Vuln IDs
-
- V-1152
- Rule IDs
-
- SV-52864r1_rule
Checks: C-47181r2_chk
Using the Registry Editor, navigate to the following key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\ If the key does not exist, this is a finding. If the permissions are not at least as restrictive as the defaults listed below, this is a finding. Administrators - Full Backup Operators - Read(QENR) Local Service - Read
Fix: F-45790r2_fix
Ensure the system is configured to prevent anonymous users from gaining access to the registry. Maintain the default permissions of the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\ Administrators - Full Backup Operators - Read(QENR) Local Service - Read
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-SO-000067
- Vuln IDs
-
- V-1153
- Rule IDs
-
- SV-52865r1_rule
Checks: C-47182r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: LmCompatibilityLevel Value Type: REG_DWORD Value: 5
Fix: F-45791r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network security: LAN Manager authentication level" to "Send NTLMv2 response only. Refuse LM & NTLM".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000019
- Vuln IDs
-
- V-1154
- Rule IDs
-
- SV-52866r1_rule
Checks: C-47183r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: DisableCAD Value Type: REG_DWORD Value: 0
Fix: F-45792r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Interactive Logon: Do not require CTRL+ALT+DEL" to "Disabled".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN12-UR-000017-MS
- Vuln IDs
-
- V-1155
- Rule IDs
-
- SV-51501r3_rule
Checks: C-58025r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If the following accounts or groups are not defined for the "Deny access to this computer from the network" user right, this is a finding: Domain Systems Only: Enterprise Admins group Domain Admins group All Local Administrator Accounts: *Systems with the new built-in security groups - use "Local account" or "Local account and member of Administrators group". **Systems that do not have the new built-in security groups - use the "DenyNetworkAccess" or "DeniedNetworkAccess" group (see V-45589). Do not use the built-in Administrators group. This group must contain the appropriate accounts/groups responsible for administering the system. All Systems: Guests group Systems dedicated to the management of Active Directory (AD admin platforms, see V-36436 in the Active Directory Domain STIG) are exempt from denying the Enterprise Admins and Domain Admins groups. *Windows 8.1 and Windows Server 2012 R2 added new built-in security groups, "Local account" and "Local account and member of Administrators group", for assigning permissions and rights to local accounts. Microsoft Security Advisory Patch 2871997 adds these groups to Windows 7, Windows 8, Windows Server 2008 R2, and Windows Server 2012. Assign the group "Local account and member of Administrators group" or the more restrictive "Local account". **Documentation and scripts supporting the use of this group to restrict local administrative accounts were changed at one point. The original name, "DeniedNetworkAccess", was changed to "DenyNetworkAccess". Automated benchmarks will look for the groups referenced in the requirement. Use of other methods will require manual validation.
Fix: F-62387r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Deny access to this computer from the network" to include the following: Domain Systems Only: Enterprise Admins group Domain Admins group *Systems with the new built-in security groups - use "Local account" or "Local account and member of Administrators group". **Systems that do not have the new built-in security groups - use the "DenyNetworkAccess" or "DeniedNetworkAccess" group (see V-45589). Do not use the built-in Administrators group. This group must contain the appropriate accounts/groups responsible for administering the system. All Systems: Guests group Systems dedicated to the management of Active Directory (AD admin platforms, see V-36436 in the Active Directory Domain STIG) are exempt from denying the Enterprise Admins and Domain Admins groups. *Windows 8.1 and Windows Server 2012 R2 added new built-in security groups, "Local account" and "Local account and member of Administrators group", for assigning permissions and rights to local accounts. Microsoft Security Advisory Patch 2871997 adds these groups to Windows 7, Windows 8, Windows Server 2008 R2, and Windows Server 2012. Assign the group "Local account and member of Administrators group" or the more restrictive "Local account". **Documentation and scripts supporting the use of this group to restrict local administrative accounts were changed at one point. The original name, "DeniedNetworkAccess", was changed to "DenyNetworkAccess". Automated benchmarks will look for the groups referenced in the requirement. Use of other methods will require manual validation.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000027
- Vuln IDs
-
- V-1157
- Rule IDs
-
- SV-52867r2_rule
Checks: C-47184r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ Value Name: SCRemoveOption Value Type: REG_SZ Value: 1 (Lock Workstation) or 2 (Force Logoff) If configuring this on servers causes issues such as terminating users' remote sessions and the site has a policy in place that any other sessions on the servers such as administrative console logons, are manually locked or logged off when unattended or not in use, this would be acceptable. This must be documented with the ISSO.
Fix: F-45793r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Interactive logon: Smart card removal behavior" to "Lock Workstation" or "Force Logoff".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000072
- Vuln IDs
-
- V-1158
- Rule IDs
-
- SV-52868r2_rule
Checks: C-47185r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole\ Value Name: SetCommand Value Type: REG_DWORD Value: 0
Fix: F-45794r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Recovery Console: Allow floppy copy and access to all drives and all folders" to "Disabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-SO-000071
- Vuln IDs
-
- V-1159
- Rule IDs
-
- SV-52869r2_rule
Checks: C-47186r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole\ Value Name: SecurityLevel Value Type: REG_DWORD Value: 0
Fix: F-45795r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Recovery console: Allow automatic administrative logon" to "Disabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN12-SO-000033
- Vuln IDs
-
- V-1162
- Rule IDs
-
- SV-52870r2_rule
Checks: C-47187r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\LanManServer\Parameters\ Value Name: EnableSecuritySignature Value Type: REG_DWORD Value: 1
Fix: F-45796r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Microsoft network server: Digitally sign communications (if client agrees)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN12-SO-000013
- Vuln IDs
-
- V-1163
- Rule IDs
-
- SV-52871r2_rule
Checks: C-47188r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Netlogon\Parameters\ Value Name: SealSecureChannel Value Type: REG_DWORD Value: 1 If the value for "Domain Member: Digitally encrypt or sign secure channel data (always)" is set to "Enabled", this can be NA (see V-6831).
Fix: F-45797r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Domain member: Digitally encrypt secure channel data (when possible)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN12-SO-000014
- Vuln IDs
-
- V-1164
- Rule IDs
-
- SV-52872r2_rule
Checks: C-47189r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Netlogon\Parameters\ Value Name: SignSecureChannel Value Type: REG_DWORD Value: 1 If the value for "Domain Member: Digitally encrypt or sign secure channel data (always)" is set to "Enabled", this can be NA (see V-6831).
Fix: F-45798r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Domain member: Digitally sign secure channel data (when possible)" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000015
- Vuln IDs
-
- V-1165
- Rule IDs
-
- SV-52873r1_rule
Checks: C-47190r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Netlogon\Parameters\ Value Name: DisablePasswordChange Value Type: REG_DWORD Value: 0
Fix: F-45799r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Domain member: Disable machine account password changes" to "Disabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN12-SO-000029
- Vuln IDs
-
- V-1166
- Rule IDs
-
- SV-52874r2_rule
Checks: C-47191r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\LanmanWorkstation\Parameters\ Value Name: EnableSecuritySignature Value Type: REG_DWORD Value: 1
Fix: F-45800r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Microsoft network client: Digitally sign communications (if server agrees)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-00-000009-01
- Vuln IDs
-
- V-1168
- Rule IDs
-
- SV-52156r2_rule
Checks: C-46951r2_chk
If no accounts are members of the Backup Operators group, this is NA. Any accounts that are members of the Backup Operators group, including application accounts, must be documented with the ISSO. If documentation of accounts that are members of the Backup Operators group is not maintained this is a finding.
Fix: F-45181r1_fix
Create the necessary documentation that identifies the members of the Backup Operators group.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000011
- Vuln IDs
-
- V-1171
- Rule IDs
-
- SV-52875r1_rule
Checks: C-47192r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ Value Name: AllocateDASD Value Type: REG_SZ Value: 0
Fix: F-45801r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Devices: Allowed to format and eject removable media" to "Administrators".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000025
- Vuln IDs
-
- V-1172
- Rule IDs
-
- SV-52876r1_rule
Checks: C-47193r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ Value Name: PasswordExpiryWarning Value Type: REG_DWORD Value: 14 (or greater)
Fix: F-45802r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Interactive Logon: Prompt user to change password before expiration" to "14" days or more.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000076
- Vuln IDs
-
- V-1173
- Rule IDs
-
- SV-52877r1_rule
Checks: C-47194r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Session Manager\ Value Name: ProtectionMode Value Type: REG_DWORD Value: 1
Fix: F-45803r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)" to "Enabled".
- RMF Control
- SC-10
- Severity
- L
- CCI
- CCI-001133
- Version
- WN12-SO-000031
- Vuln IDs
-
- V-1174
- Rule IDs
-
- SV-52878r3_rule
Checks: C-47195r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\LanManServer\Parameters\ Value Name: autodisconnect Value Type: REG_DWORD Value: 0x0000000f (15) (or less)
Fix: F-45804r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft Network Server: Amount of idle time required before suspending session" to "15" minutes or less.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- WN12-AC-000009
- Vuln IDs
-
- V-2372
- Rule IDs
-
- SV-52880r1_rule
Checks: C-47197r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy. If the value for "Store password using reversible encryption" is not set to "Disabled", this is a finding.
Fix: F-45806r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy -> "Store password using reversible encryption" to "Disabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN12-CC-000074
- Vuln IDs
-
- V-2374
- Rule IDs
-
- SV-52879r2_rule
Checks: C-47196r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\ Value Name: NoDriveTypeAutoRun Type: REG_DWORD Value: 0x000000ff (255)
Fix: F-45805r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> AutoPlay Policies -> "Turn off AutoPlay" to "Enabled:All Drives".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-GE-000017
- Vuln IDs
-
- V-2907
- Rule IDs
-
- SV-52215r2_rule
Checks: C-46961r1_chk
Determine whether the site monitors system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on servers for unauthorized changes against a baseline on a weekly basis. If system files are not monitored for unauthorized changes, this is a finding. A properly configured HBSS Policy Auditor 5.2 or later File Integrity Monitor (FIM) module will meet the requirement for file integrity checking. The Asset module within HBSS does not meet this requirement.
Fix: F-45234r1_fix
Monitor system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on servers for unauthorized changes against a baseline on a weekly basis. This can be done with the use of various monitoring tools.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- WN12-GE-000018
- Vuln IDs
-
- V-3245
- Rule IDs
-
- SV-52881r2_rule
Checks: C-47198r3_chk
Open "Computer Management". Navigate to "Shared Folders" under "System Tools". Select the "Shares" object. Right click any non-system-created shares (the system will prompt when Properties is selected for system-created shares). Select Properties. Select the Share Permissions tab. Verify the necessity of any shares found. If the file shares have not been reconfigured to restrict permissions to the specific groups or accounts that require access, this is a finding. Select the Security tab. If the NTFS permissions have not been reconfigured to restrict permissions to the specific groups or accounts that require access, this is a finding.
Fix: F-45807r2_fix
If a share is required on a system, configure the share and NTFS permissions to limit access to the specific groups or accounts that require it. Remove any unnecessary nonsystem-created shares.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-GE-000022
- Vuln IDs
-
- V-3289
- Rule IDs
-
- SV-52105r3_rule
Checks: C-46922r3_chk
Determine whether there is a host-based Intrusion Detection System on each server. If the HIPS component of HBSS is installed and active on the host and the Alerts of blocked activity are being logged and monitored, this will meet the requirement of this finding. A HID device is not required on a system that has the role as the Network Intrusion Device (NID). However, this exception needs to be documented with the site ISSO. If a host-based Intrusion Detection System is not installed on the system, this is a finding.
Fix: F-45130r1_fix
Install a host-based Intrusion Detection System on each server.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-SO-000050
- Vuln IDs
-
- V-3337
- Rule IDs
-
- SV-52882r1_rule
Checks: C-47199r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options. If the value for "Network access: Allow anonymous SID/Name translation" is not set to "Disabled", this is a finding.
Fix: F-45808r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Allow anonymous SID/Name translation" to "Disabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN12-SO-000055-MS
- Vuln IDs
-
- V-3338
- Rule IDs
-
- SV-51497r2_rule
Checks: C-46573r4_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\LanManServer\Parameters\ Value Name: NullSessionPipes Value Type: REG_MULTI_SZ Value: (blank) Legitimate applications may add entries to this registry value. If an application requires these entries to function properly and is documented with the ISSO, this would not be a finding. Documentation must contain supporting information from the vendor's instructions.
Fix: F-44296r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Named pipes that can be accessed anonymously" to be defined but containing no entries (blank).
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN12-SO-000056
- Vuln IDs
-
- V-3339
- Rule IDs
-
- SV-52883r2_rule
Checks: C-47200r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedExactPaths\ Value Name: Machine Value Type: REG_MULTI_SZ Value: see below System\CurrentControlSet\Control\ProductOptions System\CurrentControlSet\Control\Server Applications Software\Microsoft\Windows NT\CurrentVersion Legitimate applications may add entries to this registry value. If an application requires these entries to function properly and is documented with the ISSO, this would not be a finding. Documentation must contain supporting information from the vendor's instructions.
Fix: F-45809r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Remotely accessible registry paths" with the following entries: System\CurrentControlSet\Control\ProductOptions System\CurrentControlSet\Control\Server Applications Software\Microsoft\Windows NT\CurrentVersion
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN12-SO-000059
- Vuln IDs
-
- V-3340
- Rule IDs
-
- SV-52884r1_rule
Checks: C-47201r2_chk
If the following registry value does not exist, this is not a finding: If the following registry value does exist and is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\LanManServer\Parameters\ Value Name: NullSessionShares Value Type: REG_MULTI_SZ Value: (Blank)
Fix: F-45810r1_fix
Ensure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Shares that can be accessed anonymously" contains no entries (blank).
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN12-CC-000059
- Vuln IDs
-
- V-3343
- Rule IDs
-
- SV-52885r1_rule
Checks: C-47202r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fAllowToGetHelp Type: REG_DWORD Value: 0
Fix: F-45811r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Assistance -> "Configure Solicited Remote Assistance" to "Disabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-SO-000004
- Vuln IDs
-
- V-3344
- Rule IDs
-
- SV-52886r1_rule
Checks: C-47203r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: LimitBlankPasswordUse Value Type: REG_DWORD Value: 1
Fix: F-45812r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Accounts: Limit local account use of blank passwords to console logon only" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000016
- Vuln IDs
-
- V-3373
- Rule IDs
-
- SV-52887r1_rule
Checks: C-47204r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Netlogon\Parameters\ Value Name: MaximumPasswordAge Value Type: REG_DWORD Value: 30 (or less, but not 0)
Fix: F-45813r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Domain member: Maximum machine account password age" to "30" or less (excluding "0" which is unacceptable).
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN12-SO-000017
- Vuln IDs
-
- V-3374
- Rule IDs
-
- SV-52888r2_rule
Checks: C-47205r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Netlogon\Parameters\ Value Name: RequireStrongKey Value Type: REG_DWORD Value: 1 This setting may prevent a system from being joined to a domain if not configured consistently between systems.
Fix: F-45814r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Domain member: Require strong (Windows 2000 or Later) session key" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN12-SO-000053
- Vuln IDs
-
- V-3376
- Rule IDs
-
- SV-52889r1_rule
Checks: C-47206r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: DisableDomainCreds Value Type: REG_DWORD Value: 1
Fix: F-45815r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Do not allow storage of passwords and credentials for network authentication" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000054
- Vuln IDs
-
- V-3377
- Rule IDs
-
- SV-52890r1_rule
Checks: C-47207r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: EveryoneIncludesAnonymous Value Type: REG_DWORD Value: 0
Fix: F-45816r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Let everyone permissions apply to anonymous users" to "Disabled".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- WN12-SO-000060
- Vuln IDs
-
- V-3378
- Rule IDs
-
- SV-52891r1_rule
Checks: C-47208r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: ForceGuest Value Type: REG_DWORD Value: 0
Fix: F-45817r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Sharing and security model for local accounts" to "Classic - local users authenticate as themselves".
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- WN12-SO-000065
- Vuln IDs
-
- V-3379
- Rule IDs
-
- SV-52892r2_rule
Checks: C-47209r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: NoLMHash Value Type: REG_DWORD Value: 1
Fix: F-45818r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network security: Do not store LAN Manager hash value on next password change" to "Enabled".
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- WN12-SO-000066
- Vuln IDs
-
- V-3380
- Rule IDs
-
- SV-52893r1_rule
Checks: C-47210r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options. If the value for "Network security: Force logoff when logon hours expire" is not set to "Enabled", this is a finding.
Fix: F-45819r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network security: Force logoff when logon hours expire" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000068
- Vuln IDs
-
- V-3381
- Rule IDs
-
- SV-52894r1_rule
Checks: C-47211r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\LDAP\ Value Name: LDAPClientIntegrity Value Type: REG_DWORD Value: 1
Fix: F-45820r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network security: LDAP client signing requirements" to "Negotiate signing" at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000069
- Vuln IDs
-
- V-3382
- Rule IDs
-
- SV-52895r1_rule
Checks: C-47212r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\MSV1_0\ Value Name: NTLMMinClientSec Value Type: REG_DWORD Value: 0x20080000 (537395200)
Fix: F-45821r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- WN12-SO-000074
- Vuln IDs
-
- V-3383
- Rule IDs
-
- SV-52896r1_rule
Checks: C-47213r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy\ Value Name: Enabled Value Type: REG_DWORD Value: 1 Warning: Clients with this setting enabled will not be able to communicate via digitally encrypted or signed protocols with servers that do not support these algorithms. Both the browser and web server must be configured to use TLS, or the browser will not be able to connect to a secure site.
Fix: F-45822r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000075
- Vuln IDs
-
- V-3385
- Rule IDs
-
- SV-52897r1_rule
Checks: C-47214r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Session Manager\Kernel\ Value Name: ObCaseInsensitive Value Type: REG_DWORD Value: 1
Fix: F-45823r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "System objects: Require case insensitivity for non-Windows subsystems" to "Enabled".
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- WN12-CC-000131
- Vuln IDs
-
- V-3449
- Rule IDs
-
- SV-52216r2_rule
Checks: C-46962r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fSingleSessionPerUser Type: REG_DWORD Value: 1
Fix: F-45235r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Connections -> "Restrict Remote Desktop Services users to a single Remote Desktop Services Session" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN12-CC-000099
- Vuln IDs
-
- V-3453
- Rule IDs
-
- SV-52898r1_rule
Checks: C-47215r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fPromptForPassword Type: REG_DWORD Value: 1
Fix: F-45824r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Security -> "Always prompt for password upon connection" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- WN12-CC-000100
- Vuln IDs
-
- V-3454
- Rule IDs
-
- SV-52899r2_rule
Checks: C-47216r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: MinEncryptionLevel Type: REG_DWORD Value: 3
Fix: F-45825r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Security -> "Set client connection encryption level" to "Enabled" and "High Level".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000104
- Vuln IDs
-
- V-3455
- Rule IDs
-
- SV-52900r1_rule
Checks: C-47217r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: PerSessionTempDir Type: REG_DWORD Value: 1
Fix: F-45826r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Temporary Folders -> "Do not use temporary folders per session" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000103
- Vuln IDs
-
- V-3456
- Rule IDs
-
- SV-52901r1_rule
Checks: C-47218r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: DeleteTempDirsOnExit Type: REG_DWORD Value: 1
Fix: F-45827r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Temporary Folders -> "Do not delete temp folder upon exit" to "Disabled".
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- WN12-CC-000102
- Vuln IDs
-
- V-3457
- Rule IDs
-
- SV-52902r2_rule
Checks: C-47219r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: MaxDisconnectionTime Type: REG_DWORD Value: 0x0000ea60 (60000)
Fix: F-45828r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Session Time Limits -> "Set time limit for disconnected sessions" to "Enabled", and "End a disconnected session" to "1 minute".
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- WN12-CC-000101
- Vuln IDs
-
- V-3458
- Rule IDs
-
- SV-52903r2_rule
Checks: C-47220r2_chk
If the following registry value does not exist or its value is set to "0" or greater than "15" minutes, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: MaxIdleTime Type: REG_DWORD Value: 0x000dbba0 (900000) or less but not 0
Fix: F-45829r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Session Time Limits -> "Set time limit for active but idle Remote Desktop Services sessions" to "Enabled", and the "Idle session limit" to 15 minutes or less, excluding "0", which equates to "Never".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000029
- Vuln IDs
-
- V-3469
- Rule IDs
-
- SV-52906r1_rule
Checks: C-47221r2_chk
Review the registry. If the following registry value does not exist, this is not a finding (this is the expected result from configuring the policy as outlined in the Fix section.): If the following registry value exists but is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\system\ Value Name: DisableBkGndGroupPolicy Type: REG_DWORD Value: 0
Fix: F-45832r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Group Policy -> "Turn off background refresh of Group Policy" to "Disabled".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- WN12-CC-000058
- Vuln IDs
-
- V-3470
- Rule IDs
-
- SV-52917r1_rule
Checks: C-47222r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fAllowUnsolicited Type: REG_DWORD Value: 0
Fix: F-45843r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Assistance -> "Configure Offer Remote Assistance" to "Disabled".
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-001891
- Version
- WN12-CC-000069
- Vuln IDs
-
- V-3472
- Rule IDs
-
- SV-52919r2_rule
Checks: C-47224r3_chk
Review the following registry values: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\W32time\Parameters\ Value Name: Type Type: REG_SZ Value: Possible values are NoSync, NTP, NT5DS, AllSync and Value Name: NTPServer Type: REG_SZ Value: "address of the time server" If the following, this is a finding: "Type" has a value of "NTP" or "Allsync" AND the "NTPServer" value is set to "time.windows.com" or other unauthorized server. If the following, this not a finding: The referenced registry values do not exist. "Type" has a value of "NoSync" or "NT5DS". "Type" has a value of "NTP" or "Allsync" AND the "NTPServer" is blank or configured to an authorized time server. For DoD organizations, the US Naval Observatory operates stratum 1 time servers, identified at http://tycho.usno.navy.mil/ntp.html. Time synchronization will occur through a hierarchy of time servers down to the local level. Clients and lower-level servers will synchronize with an authorized time server in the hierarchy. Domain-joined systems are automatically configured to synchronize with domain controllers, and it would not be a finding unless this is changed.
Fix: F-45845r1_fix
If the system needs to be configured to an NTP server, configure the system to point to an authorized time server by setting the policy value for Computer Configuration -> Administrative Templates -> System -> Windows Time Service -> Time Providers -> "Configure Windows NTP Client" to "Enabled", and configure the "NtpServer" field to point to an authorized time server.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000045
- Vuln IDs
-
- V-3479
- Rule IDs
-
- SV-52920r1_rule
Checks: C-47225r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Session Manager\ Value Name: SafeDllSearchMode Value Type: REG_DWORD Value: 1
Fix: F-45846r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)" to "Enabled". (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- WN12-CC-000122
- Vuln IDs
-
- V-3480
- Rule IDs
-
- SV-53130r1_rule
Checks: C-47436r1_chk
Windows Media Player is not installed by default. If it is not installed, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\WindowsMediaPlayer\ Value Name: DisableAutoupdate Type: REG_DWORD Value: 1
Fix: F-46056r1_fix
If Windows Media Player is installed, configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Media Player -> "Prevent Automatic Updates" to "Enabled".
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- WN12-UC-000013
- Vuln IDs
-
- V-3481
- Rule IDs
-
- SV-52921r1_rule
Checks: C-47226r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Policies\Microsoft\WindowsMediaPlayer\ Value Name: PreventCodecDownload Type: REG_DWORD Value: 1
Fix: F-45847r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> Windows Components -> Windows Media Player -> Playback -> "Prevent Codec Download" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-GE-000021
- Vuln IDs
-
- V-3487
- Rule IDs
-
- SV-52218r2_rule
Checks: C-46963r2_chk
Required services will vary between organizations, and on the role of the individual system. Organizations will develop their own list of services which will be documented and justified with the ISSO. The site's list will be provided for any security review. Services common to multiple systems can be addressed in one document. Exceptions for individual systems should be identified separately by system. Individual services specifically required to be disabled per the STIG are identified in separate requirements. If the site has not documented the services required for their system(s), this is a finding. The following can be used to view the services on a system: Run "Services.msc". Services for Windows Server 2012 roles are managed automatically, adding those necessary for a particular role. The following lists the default services for a baseline installation as a reference. This can be used as a basis for documenting the services necessary. Default Installation Name - Startup Type Application Experience - Manual (Trigger Start) Application Identity - Manual (Trigger Start) Application Information - Manual Application Layer Gateway Service - Manual Application Management - Manual Background Intelligent Transfer Service - Automatic (Delayed Start) Background Tasks Infrastructure Service - Automatic Base Filtering Engine - Automatic Certificate Propagation - Manual CNG Key Isolation - Manual (Trigger Start) COM+ Event System - Automatic COM+ System Application - Manual Computer Browser - Disabled Credential Manager - Manual Cryptographic Services - Automatic DCOM Server Process Launcher - Automatic Device Association Service - Manual (Trigger Start) Device Install Service - Manual (Trigger Start) Device Setup Manager - Manual (Trigger Start) DHCP Client - Automatic Diagnostic Policy Service - Automatic (Delayed Start) Diagnostic Service Host - Manual Diagnostic System Host - Manual Distributed Link Tracking Client - Automatic Distributed Transaction Coordinator - Automatic (Delayed Start) DNS Client - Automatic (Trigger Start) Encrypting File System (EFS) - Manual (Trigger Start) Extensible Authentication Protocol - Manual Function Discovery Provider Host - Manual Function Discovery Resource Publication - Manual Group Policy Client - Automatic (Trigger Start) Health Key and Certificate Management - Manual Human Interface Device Access - Manual (Trigger Start) Hyper-V Data Exchange Service - Manual (Trigger Start) Hyper-V Guest Shutdown Service - Manual (Trigger Start) Hyper-V Heartbeat Service - Manual (Trigger Start) Hyper-V Remote Desktop Virtualization Service - Manual (Trigger Start) Hyper-V Time Synchronization Service - Manual (Trigger Start) Hyper-V Volume Shadow Copy Requestor - Manual (Trigger Start) IKE and AuthIP IPsec Keying Modules - Manual (Trigger Start) Interactive Services Detection - Manual Internet Connection Sharing (ICS) - Disabled IP Helper - Automatic IPsec Policy Agent - Manual (Trigger Start) KDC Proxy Server service (KPS) - Manual KtmRm for Distributed Transaction Coordinator - Manual (Trigger Start) Link-Layer Topology Discovery Mapper - Manual Local Session Manager - Automatic Microsoft iSCSI Initiator Service - Manual Microsoft Software Shadow Copy Provider - Manual Multimedia Class Scheduler - Manual Net.Tcp Port Sharing Service - Disabled Netlogon - Manual Network Access Protection Agent - Manual Network Connections - Manual Network Connectivity Assistant - Manual (Trigger Start) Network List Service - Manual Network Location Awareness - Automatic Network Store Interface Service - Automatic Optimize drives - Manual Performance Counter DLL Host - Manual Performance Logs & Alerts - Manual Plug and Play - Manual Portable Device Enumerator Service - Manual (Trigger Start) Power - Automatic Print Spooler - Automatic Printer Extensions and Notifications - Manual Problem Reports and Solutions Control Panel Support - Manual Remote Access Auto Connection Manager - Manual Remote Access Connection Manager - Manual Remote Desktop Configuration - Manual Remote Desktop Services - Manual Remote Desktop Services UserMode Port Redirector - Manual Remote Procedure Call (RPC) - Automatic Remote Procedure Call (RPC) Locator - Manual Remote Registry - Automatic (Trigger Start) Resultant Set of Policy Provider - Manual Routing and Remote Access - Disabled RPC Endpoint Mapper - Automatic Secondary Logon - Manual Secure Socket Tunneling Protocol Service - Manual Security Accounts Manager - Automatic Server - Automatic Shell Hardware Detection - Automatic Smart Card - Disabled Smart Card Removal Policy - Manual SNMP Trap - Manual Software Protection - Automatic (Delayed Start, Trigger Start) Special Administration Console Helper - Manual Spot Verifier - Manual (Trigger Start) SSDP Discovery - Disabled Superfetch - Manual System Event Notification Service - Automatic Task Scheduler - Automatic TCP/IP NetBIOS Helper - Automatic (Trigger Start) Telephony - Manual Themes - Automatic Thread Ordering Server - Manual UPnP Device Host - Disabled User Access Logging Service - Automatic (Delayed Start) User Profile Service - Automatic Virtual Disk - Manual Volume Shadow Copy - Manual Windows All-User Install Agent - Manual (Trigger Start) Windows Audio - Manual Windows Audio Endpoint Builder - Manual Windows Color System - Manual Windows Driver Foundation - User-mode Driver Framework - Manual (Trigger Start) Windows Error Reporting Service - Manual (Trigger Start) Windows Event Collector - Manual Windows Event Log - Automatic Windows Firewall - Automatic Windows Font Cache Service - Automatic Windows Installer - Manual Windows Licensing Monitoring Service - Automatic Windows Management Instrumentation - Automatic Windows Modules Installer - Manual Windows Remote Management (WS-Management) - Automatic Windows Store Service (WSService) - Manual (Trigger Start) Windows Time - Manual (Trigger Start) Windows Update - Manual WinHTTP Web Proxy Auto-Discovery Service - Manual Wired AutoConfig - Manual WMI Performance Adapter - Manual Workstation - Automatic
Fix: F-45237r1_fix
Document the services required for the system to operate. Remove or disable any services that are not required.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000070
- Vuln IDs
-
- V-3666
- Rule IDs
-
- SV-52922r1_rule
Checks: C-47227r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\MSV1_0\ Value Name: NTLMMinServerSec Value Type: REG_DWORD Value: 0x20080000 (537395200)
Fix: F-45848r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-000139
- Version
- WN12-SO-000049
- Vuln IDs
-
- V-4108
- Rule IDs
-
- SV-52923r2_rule
Checks: C-47228r2_chk
If the system is configured to write to an audit server, or is configured to automatically archive full logs, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Eventlog\Security\ Value Name: WarningLevel Value Type: REG_DWORD Value: 90 (or less)
Fix: F-45849r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning" to "90" or less. (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000038
- Vuln IDs
-
- V-4110
- Rule IDs
-
- SV-52924r1_rule
Checks: C-47229r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Tcpip\Parameters\ Value Name: DisableIPSourceRouting Value Type: REG_DWORD Value: 2
Fix: F-45850r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)" to "Highest protection, source routing is completely disabled". (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000039
- Vuln IDs
-
- V-4111
- Rule IDs
-
- SV-52925r1_rule
Checks: C-47230r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Tcpip\Parameters\ Value Name: EnableICMPRedirect Value Type: REG_DWORD Value: 0
Fix: F-45851r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes" to "Disabled". (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN12-SO-000044
- Vuln IDs
-
- V-4112
- Rule IDs
-
- SV-52926r1_rule
Checks: C-47231r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Tcpip\Parameters\ Value Name: PerformRouterDiscovery Value Type: REG_DWORD Value: 0
Fix: F-45852r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS)" to "Disabled". (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN12-SO-000041
- Vuln IDs
-
- V-4113
- Rule IDs
-
- SV-52927r1_rule
Checks: C-47232r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Tcpip\Parameters\ Value Name: KeepAliveTime Value Type: REG_DWORD Value: 300000 (or less)
Fix: F-45853r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds" to "300000 or 5 minutes (recommended)" or less. (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN12-SO-000043
- Vuln IDs
-
- V-4116
- Rule IDs
-
- SV-52928r2_rule
Checks: C-47233r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\Netbt\Parameters\ Value Name: NoNameReleaseOnDemand Value Type: REG_DWORD Value: 1
Fix: F-45854r3_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers" to "Enabled". (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN12-SO-000048
- Vuln IDs
-
- V-4438
- Rule IDs
-
- SV-52929r2_rule
Checks: C-47234r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\ Value Name: TcpMaxDataRetransmissions Value Type: REG_DWORD Value: 3 (or less)
Fix: F-45855r3_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)" to "3" or less. (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000046
- Vuln IDs
-
- V-4442
- Rule IDs
-
- SV-52930r1_rule
Checks: C-47235r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ Value Name: ScreenSaverGracePeriod Value Type: REG_SZ Value: 5 (or less)
Fix: F-45856r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)" to "5" or less. (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN12-SO-000057
- Vuln IDs
-
- V-4443
- Rule IDs
-
- SV-52931r2_rule
Checks: C-47236r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedPaths\ Value Name: Machine Value Type: REG_MULTI_SZ Value: see below Software\Microsoft\OLAP Server Software\Microsoft\Windows NT\CurrentVersion\Perflib Software\Microsoft\Windows NT\CurrentVersion\Print Software\Microsoft\Windows NT\CurrentVersion\Windows System\CurrentControlSet\Control\ContentIndex System\CurrentControlSet\Control\Print\Printers System\CurrentControlSet\Control\Terminal Server System\CurrentControlSet\Control\Terminal Server\UserConfig System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration System\CurrentControlSet\Services\Eventlog System\CurrentControlSet\Services\Sysmonlog Legitimate applications may add entries to this registry value. If an application requires these entries to function properly and is documented with the ISSO, this would not be a finding. Documentation must contain supporting information from the vendor's instructions.
Fix: F-45857r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Remotely accessible registry paths and sub-paths" with the following entries: Software\Microsoft\OLAP Server Software\Microsoft\Windows NT\CurrentVersion\Perflib Software\Microsoft\Windows NT\CurrentVersion\Print Software\Microsoft\Windows NT\CurrentVersion\Windows System\CurrentControlSet\Control\ContentIndex System\CurrentControlSet\Control\Print\Printers System\CurrentControlSet\Control\Terminal Server System\CurrentControlSet\Control\Terminal Server\UserConfig System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration System\CurrentControlSet\Services\Eventlog System\CurrentControlSet\Services\Sysmonlog
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-SO-000088
- Vuln IDs
-
- V-4445
- Rule IDs
-
- SV-52219r2_rule
Checks: C-46964r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Session Manager\Subsystems\ Value Name: Optional Value Type: REG_MULTI_SZ Value: (Blank)
Fix: F-45238r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "System settings: Optional subsystems" to "Blank" (Configured with no entries).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000087
- Vuln IDs
-
- V-4446
- Rule IDs
-
- SV-52221r2_rule
Checks: C-46965r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\ Value Name: AuthenticodeEnabled Value Type: REG_DWORD Value: 1
Fix: F-45239r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- WN12-CC-000130
- Vuln IDs
-
- V-4447
- Rule IDs
-
- SV-52932r2_rule
Checks: C-47237r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fEncryptRPCTraffic Type: REG_DWORD Value: 1
Fix: F-45858r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Security -> "Require secure RPC communication" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000028
- Vuln IDs
-
- V-4448
- Rule IDs
-
- SV-52933r1_rule
Checks: C-47238r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}\ Value Name: NoGPOListChanges Type: REG_DWORD Value: 0
Fix: F-45859r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Group Policy -> "Configure registry policy processing" to "Enabled" and select the option "Process even if the Group Policy objects have not changed".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN12-SO-000012
- Vuln IDs
-
- V-6831
- Rule IDs
-
- SV-52934r2_rule
Checks: C-47239r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Netlogon\Parameters\ Value Name: RequireSignOrSeal Value Type: REG_DWORD Value: 1
Fix: F-45860r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Domain member: Digitally encrypt or sign secure channel data (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN12-SO-000028
- Vuln IDs
-
- V-6832
- Rule IDs
-
- SV-52935r2_rule
Checks: C-47240r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\LanmanWorkstation\Parameters\ Value Name: RequireSecuritySignature Value Type: REG_DWORD Value: 1
Fix: F-45861r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Microsoft network client: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN12-SO-000032
- Vuln IDs
-
- V-6833
- Rule IDs
-
- SV-52936r2_rule
Checks: C-47241r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\LanManServer\Parameters\ Value Name: RequireSecuritySignature Value Type: REG_DWORD Value: 1
Fix: F-45862r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Microsoft network server: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN12-SO-000058
- Vuln IDs
-
- V-6834
- Rule IDs
-
- SV-52937r1_rule
Checks: C-47242r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\LanManServer\Parameters\ Value Name: RestrictNullSessAccess Value Type: REG_DWORD Value: 1
Fix: F-45863r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Restrict anonymous access to Named Pipes and Shares" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- WN12-AC-000007
- Vuln IDs
-
- V-6836
- Rule IDs
-
- SV-52938r2_rule
Checks: C-47243r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy. If the value for the "Minimum password length," is less than "14" characters, this is a finding.
Fix: F-45864r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy -> "Minimum password length" to "14" characters.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- WN12-GE-000016
- Vuln IDs
-
- V-6840
- Rule IDs
-
- SV-52939r3_rule
Checks: C-47245r4_chk
Run the DUMPSEC utility. Select "Dump Users as Table" from the "Report" menu. Select the following fields, and click "Add" for each entry: UserName SID PswdExpires AcctDisabled Groups If any accounts have "No" in the "PswdExpires" column, this is a finding. The following are exempt from this requirement: Application Accounts Domain accounts requiring smart card (CAC/PIV) The following PowerShell command may be used on domain controllers to list accounts with the Password Never Expires flag: Search-ADAccount -PasswordNeverExpires -UsersOnly
Fix: F-45865r2_fix
Configure all passwords to expire. Ensure "Password never expires" is not checked on any accounts. Document any exceptions with the ISSO.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- WN12-GE-000015
- Vuln IDs
-
- V-7002
- Rule IDs
-
- SV-52940r1_rule
Checks: C-47246r2_chk
Verify all accounts require passwords. Run the DUMPSEC utility. Select "Dump Users as Table" from the "Report" menu. Select the following fields, and click "Add" for each entry: UserName SID PswdRequired AcctDisabled Groups If any accounts have "No" in the "PswdRequired" column, this is a finding. Some built-in or application-generated accounts (e.g., Guest, IWAM_, IUSR, etc.) may not have this flag set, even though there are passwords present. It can be set by entering the following on a command line: "Net user <account_name> /passwordreq:yes".
Fix: F-45866r2_fix
Ensure all accounts are configured to require passwords to gain access. The password required flag can be set by entering the following on a command line: "Net user <account_name> /passwordreq:yes".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000018
- Vuln IDs
-
- V-11806
- Rule IDs
-
- SV-52941r1_rule
Checks: C-47247r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: DontDisplayLastUserName Value Type: REG_DWORD Value: 1
Fix: F-45867r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Interactive logon: Do not display last user name" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-00-000007
- Vuln IDs
-
- V-14225
- Rule IDs
-
- SV-52942r2_rule
Checks: C-47248r2_chk
Determine if any system administrators have left the organization within the last year. Run the DUMPSEC utility. Select "Dump Users as Table" from the "Report" menu. Select the following fields, and click "Add" for each entry: UserName SID PwsdLastSetTime If the built-in Administrator account has a date older than one year in the "PwsdLastSetTime" column, this is a finding. If any system administrators has left the organization within the last year and the "PwsdLastSetTime" field reflects the built-in Administrator account password was not changed at that time, this is a finding.
Fix: F-45868r1_fix
Change the built-in Administrator account password at least annually or whenever an administrator leaves the organization.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- WN12-SO-000007
- Vuln IDs
-
- V-14228
- Rule IDs
-
- SV-53129r1_rule
Checks: C-47435r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: AuditBaseObjects Value Type: REG_DWORD Value: 0
Fix: F-46055r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Audit: Audit the access of global system objects" to "Disabled".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- WN12-SO-000008
- Vuln IDs
-
- V-14229
- Rule IDs
-
- SV-52943r1_rule
Checks: C-47249r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: FullPrivilegeAuditing Value Type: REG_BINARY Value: 0
Fix: F-45869r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Audit: Audit the use of Backup and Restore privilege" to "Disabled".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- WN12-SO-000009
- Vuln IDs
-
- V-14230
- Rule IDs
-
- SV-52944r1_rule
Checks: C-47250r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: SCENoApplyLegacyAuditPolicy Value Type: REG_DWORD Value: 1
Fix: F-45870r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000042
- Vuln IDs
-
- V-14232
- Rule IDs
-
- SV-52945r1_rule
Checks: C-47251r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\IPSEC\ Value Name: NoDefaultExempt Value Type: REG_DWORD Value: 3
Fix: F-45871r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic" to "Only ISAKMP is exempt (recommended for Windows Server 2003)". (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN12-SO-000077
- Vuln IDs
-
- V-14234
- Rule IDs
-
- SV-52946r1_rule
Checks: C-47252r2_chk
UAC requirements are NA on Server Core installations. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: FilterAdministratorToken Value Type: REG_DWORD Value: 1
Fix: F-45872r2_fix
UAC requirements are NA on Server Core installations. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Admin Approval Mode for the Built-in Administrator account" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN12-SO-000078
- Vuln IDs
-
- V-14235
- Rule IDs
-
- SV-52947r1_rule
Checks: C-47253r2_chk
UAC requirements are NA on Server Core installations. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: ConsentPromptBehaviorAdmin Value Type: REG_DWORD Value: 4 (Prompt for consent) 3 (Prompt for credentials) 2 (Prompt for consent on the secure desktop) 1 (Prompt for credentials on the secure desktop)
Fix: F-45873r2_fix
UAC requirements are NA on Server Core installations. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to "Prompt for consent". More secure options for this setting would also be acceptable (e.g., Prompt for credentials, Prompt for consent (or credentials) on the secure desktop).
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN12-SO-000079
- Vuln IDs
-
- V-14236
- Rule IDs
-
- SV-52948r1_rule
Checks: C-47254r2_chk
UAC requirements are NA on Server Core installations. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: ConsentPromptBehaviorUser Value Type: REG_DWORD Value: 0
Fix: F-45874r2_fix
UAC requirements are NA on Server Core installations. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Behavior of the elevation prompt for standard users" to "Automatically deny elevation requests".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN12-SO-000080
- Vuln IDs
-
- V-14237
- Rule IDs
-
- SV-52949r1_rule
Checks: C-47255r2_chk
UAC requirements are NA on Server Core installations. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: EnableInstallerDetection Value Type: REG_DWORD Value: 1
Fix: F-45875r2_fix
UAC requirements are NA on Server Core installations. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Detect application installations and prompt for elevation" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN12-SO-000082
- Vuln IDs
-
- V-14239
- Rule IDs
-
- SV-52950r1_rule
Checks: C-47256r2_chk
UAC requirements are NA on Server Core installations. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: EnableSecureUIAPaths Value Type: REG_DWORD Value: 1
Fix: F-45876r2_fix
UAC requirements are NA on Server Core installations. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Only elevate UIAccess applications that are installed in secure locations" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN12-SO-000083
- Vuln IDs
-
- V-14240
- Rule IDs
-
- SV-52951r1_rule
Checks: C-47257r2_chk
UAC requirements are NA on Server Core installations. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: EnableLUA Value Type: REG_DWORD Value: 1
Fix: F-45877r2_fix
UAC requirements are NA on Server Core installations. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Run all administrators in Admin Approval Mode" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN12-SO-000084
- Vuln IDs
-
- V-14241
- Rule IDs
-
- SV-52952r1_rule
Checks: C-47258r2_chk
UAC requirements are NA on Server Core installations. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: PromptOnSecureDesktop Value Type: REG_DWORD Value: 1
Fix: F-45878r2_fix
UAC requirements are NA on Server Core installations. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Switch to the secure desktop when prompting for elevation" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN12-SO-000085
- Vuln IDs
-
- V-14242
- Rule IDs
-
- SV-52953r1_rule
Checks: C-47259r1_chk
UAC requirements are NA on Server Core installations. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: EnableVirtualization Value Type: REG_DWORD Value: 1
Fix: F-45879r2_fix
UAC requirements are NA on Server Core installations. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Virtualize file and registry write failures to per-user locations" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN12-CC-000077
- Vuln IDs
-
- V-14243
- Rule IDs
-
- SV-52955r1_rule
Checks: C-47261r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\CredUI\ Value Name: EnumerateAdministrators Type: REG_DWORD Value: 0
Fix: F-45881r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Credential User Interface -> "Enumerate administrator accounts on elevation" to "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN12-CC-000096
- Vuln IDs
-
- V-14247
- Rule IDs
-
- SV-52958r1_rule
Checks: C-47264r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: DisablePasswordSaving Type: REG_DWORD Value: 1
Fix: F-45884r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Connection Client -> "Do not allow passwords to be saved" to "Enabled".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- WN12-CC-000098
- Vuln IDs
-
- V-14249
- Rule IDs
-
- SV-52959r1_rule
Checks: C-47265r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fDisableCdm Type: REG_DWORD Value: 1
Fix: F-45885r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Device and Resource Redirection -> "Do not allow drive redirection" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN12-CC-000064-MS
- Vuln IDs
-
- V-14253
- Rule IDs
-
- SV-52988r2_rule
Checks: C-47294r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows NT\Rpc\ Value Name: RestrictRemoteClients Type: REG_DWORD Value: 1
Fix: F-45914r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Procedure Call -> "Restrict Unauthenticated RPC clients" to "Enabled" and "Authenticated".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN12-CC-000063-MS
- Vuln IDs
-
- V-14254
- Rule IDs
-
- SV-52989r2_rule
Checks: C-47295r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows NT\Rpc\ Value Name: EnableAuthEpResolution Value Type: REG_DWORD Value: 1
Fix: F-45915r3_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Enable RPC Endpoint Mapper Client Authentication" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000039
- Vuln IDs
-
- V-14259
- Rule IDs
-
- SV-52997r1_rule
Checks: C-47304r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Printers\ Value Name: DisableHTTPPrinting Type: REG_DWORD Value: 1
Fix: F-45924r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings -> "Turn off printing over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000032
- Vuln IDs
-
- V-14260
- Rule IDs
-
- SV-52998r1_rule
Checks: C-47305r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Printers\ Value Name: DisableWebPnPDownload Type: REG_DWORD Value: 1
Fix: F-45925r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings -> "Turn off downloading of print drivers over HTTP" to "Enabled".
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- WN12-CC-000047
- Vuln IDs
-
- V-14261
- Rule IDs
-
- SV-53000r1_rule
Checks: C-47307r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\DriverSearching\ Value Name: DontSearchWindowsUpdate Type: REG_DWORD Value: 1
Fix: F-45927r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings -> "Turn off Windows Update device driver searching" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-UC-000009
- Vuln IDs
-
- V-14268
- Rule IDs
-
- SV-53002r1_rule
Checks: C-47309r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\Attachments\ Value Name: SaveZoneInformation Type: REG_DWORD Value: 2
Fix: F-45929r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> Windows Components -> Attachment Manager -> "Do not preserve zone information in file attachments" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-UC-000010
- Vuln IDs
-
- V-14269
- Rule IDs
-
- SV-53004r1_rule
Checks: C-47311r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\Attachments\ Value Name: HideZoneInfoOnProperties Type: REG_DWORD Value: 1
Fix: F-45931r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> Windows Components -> Attachment Manager -> "Hide mechanisms to remove zone information" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-UC-000011
- Vuln IDs
-
- V-14270
- Rule IDs
-
- SV-53006r1_rule
Checks: C-47313r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\Attachments\ Value Name: ScanWithAntiVirus Type: REG_DWORD Value: 3
Fix: F-45933r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> Windows Components -> Attachment Manager -> "Notify antivirus programs when opening attachments" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-GE-000019
- Vuln IDs
-
- V-15505
- Rule IDs
-
- SV-53010r1_rule
Checks: C-47316r2_chk
Search for the file FrameworkService.exe (by default in the \Program Files\McAfee\Common Framework\ directory) and check that the version is 4 or above. Also verify that the Service "McAfee Framework Service" is running. If either of these conditions does not exist, this is a finding.
Fix: F-45937r1_fix
Deploy the McAfee Agent as detailed in accordance with the DoD HBSS STIG.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000003
- Vuln IDs
-
- V-15666
- Rule IDs
-
- SV-53012r1_rule
Checks: C-47319r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Peernet\ Value Name: Disabled Type: REG_DWORD Value: 1
Fix: F-45939r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Microsoft Peer-to-Peer Networking Services -> "Turn off Microsoft Peer-to-Peer Networking Services" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000004
- Vuln IDs
-
- V-15667
- Rule IDs
-
- SV-53014r2_rule
Checks: C-47321r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Network Connections\ Value Name: NC_AllowNetBridge_NLA Type: REG_DWORD Value: 0
Fix: F-45941r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Network Connections -> "Prohibit installation and configuration of Network Bridge on your DNS domain network" to "Enabled".
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000185
- Version
- WN12-CC-000031
- Vuln IDs
-
- V-15671
- Rule IDs
-
- SV-53015r1_rule
Checks: C-47322r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\SystemCertificates\AuthRoot\ Value Name: DisableRootAutoUpdate Type: REG_DWORD Value: 1
Fix: F-45942r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings -> "Turn off Automatic Root Certificates Update" to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000033
- Vuln IDs
-
- V-15672
- Rule IDs
-
- SV-53017r1_rule
Checks: C-47324r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\EventViewer\ Value Name: MicrosoftEventVwrDisableLinks Type: REG_DWORD Value: 1
Fix: F-45944r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings -> "Turn off Event Viewer "Events.asp" links" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000038
- Vuln IDs
-
- V-15674
- Rule IDs
-
- SV-53021r1_rule
Checks: C-47327r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\ Value Name: NoInternetOpenWith Type: REG_DWORD Value: 1
Fix: F-45947r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings -> "Turn off Internet File Association service" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000049-MS
- Vuln IDs
-
- V-15680
- Rule IDs
-
- SV-53036r2_rule
Checks: C-61741r2_chk
If the system is a member of a domain, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: LogonType Type: REG_DWORD Value: 0
Fix: F-66505r3_fix
If the system is a member of a domain, this is NA. Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Always use classic logon" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000105
- Vuln IDs
-
- V-15682
- Rule IDs
-
- SV-53040r1_rule
Checks: C-47346r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Internet Explorer\Feeds\ Value Name: DisableEnclosureDownload Type: REG_DWORD Value: 1
Fix: F-45966r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> RSS Feeds -> "Prevent downloading of enclosures" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000091
- Vuln IDs
-
- V-15683
- Rule IDs
-
- SV-53045r1_rule
Checks: C-47350r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\ Value Name: PreXPSP2ShellProtocolBehavior Type: REG_DWORD Value: 0
Fix: F-45971r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> File Explorer -> "Turn off shell protocol protected mode" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000117
- Vuln IDs
-
- V-15684
- Rule IDs
-
- SV-53056r2_rule
Checks: C-47359r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Installer\ Value Name: SafeForScripting Type: REG_DWORD Value: 0
Fix: F-45982r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Installer -> "Prevent Internet Explorer security prompt for Windows Installer scripts" to "Disabled".
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- WN12-CC-000115
- Vuln IDs
-
- V-15685
- Rule IDs
-
- SV-53061r1_rule
Checks: C-47366r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Installer\ Value Name: EnableUserControl Type: REG_DWORD Value: 0
Fix: F-45986r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Installer -> "Allow user control over installs" to "Disabled".
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- WN12-CC-000118
- Vuln IDs
-
- V-15686
- Rule IDs
-
- SV-53065r1_rule
Checks: C-47371r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Installer\ Value Name: DisableLUAPatching Type: REG_DWORD Value: 1
Fix: F-45991r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Installer -> "Prohibit non-administrators from applying vendor signed updates" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000121
- Vuln IDs
-
- V-15687
- Rule IDs
-
- SV-53069r1_rule
Checks: C-47374r2_chk
Windows Media Player is not installed by default. If it is not installed, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\WindowsMediaPlayer\ Value Name: GroupPrivacyAcceptance Type: REG_DWORD Value: 1
Fix: F-45995r1_fix
If Windows Media Player is installed, configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Media Player -> "Do Not Show First Use Dialog Boxes" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000001
- Vuln IDs
-
- V-15696
- Rule IDs
-
- SV-53072r1_rule
Checks: C-47378r2_chk
If the following registry values do not exist or are not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\LLTD\ Value Name: AllowLLTDIOOndomain Value Name: AllowLLTDIOOnPublicNet Value Name: EnableLLTDIO Value Name: ProhibitLLTDIOOnPrivateNet Type: REG_DWORD Value: 0
Fix: F-45998r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Link-Layer Topology Discovery -> "Turn on Mapper I/O (LLTDIO) driver" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000002
- Vuln IDs
-
- V-15697
- Rule IDs
-
- SV-53081r1_rule
Checks: C-47387r2_chk
If the following registry values do not exist or are not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\LLTD\ Value Name: AllowRspndrOndomain Value Name: AllowRspndrOnPublicNet Value Name: EnableRspndr Value Name: ProhibitRspndrOnPrivateNet Type: REG_DWORD Value: 0
Fix: F-46007r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Link-Layer Topology Discovery -> "Turn on Responder (RSPNDR) driver" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000012
- Vuln IDs
-
- V-15698
- Rule IDs
-
- SV-53085r1_rule
Checks: C-47391r2_chk
If the following registry values do not exist or are not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\WCN\Registrars\ Value Name: DisableFlashConfigRegistrar Value Name: DisableInBand802DOT11Registrar Value Name: DisableUPnPRegistrar Value Name: DisableWPDRegistrar Value Name: EnableRegistrars Type: REG_DWORD Value: 0
Fix: F-46011r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Windows Connect Now -> "Configuration of wireless settings using Windows Connect Now" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000013
- Vuln IDs
-
- V-15699
- Rule IDs
-
- SV-53089r1_rule
Checks: C-47395r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\WCN\UI\ Value Name: DisableWcnUi Type: REG_DWORD Value: 1
Fix: F-46015r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Windows Connect Now -> "Prohibit access of the Windows Connect Now wizards" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000019
- Vuln IDs
-
- V-15700
- Rule IDs
-
- SV-53094r1_rule
Checks: C-47400r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\DeviceInstall\Settings\ Value Name: AllowRemoteRPC Type: REG_DWORD Value: 0
Fix: F-46020r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Device Installation -> "Allow remote access to the Plug and Play interface" to "Disabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000021
- Vuln IDs
-
- V-15701
- Rule IDs
-
- SV-53099r1_rule
Checks: C-47405r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\DeviceInstall\Settings\ Value Name: DisableSystemRestore Type: REG_DWORD Value: 0
Fix: F-46025r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Device Installation -> "Prevent creation of a system restore point during device activity that would normally prompt creation of a restore point" to "Disabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000020
- Vuln IDs
-
- V-15702
- Rule IDs
-
- SV-53105r1_rule
Checks: C-47410r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\DeviceInstall\Settings\ Value Name: DisableSendGenericDriverNotFoundToWER Type: REG_DWORD Value: 1
Fix: F-46030r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Device Installation -> "Do not send a Windows error report when a generic driver is installed on a device" to "Enabled".
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- WN12-CC-000026
- Vuln IDs
-
- V-15703
- Rule IDs
-
- SV-53115r1_rule
Checks: C-47421r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\DriverSearching\ Value Name: DontPromptForWindowsUpdate Type: REG_DWORD Value: 1
Fix: F-46041r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Driver Installation -> "Turn off Windows Update device driver search prompt" to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000035
- Vuln IDs
-
- V-15704
- Rule IDs
-
- SV-53116r1_rule
Checks: C-47422r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\HandwritingErrorReports\ Value Name: PreventHandwritingErrorReports Type: REG_DWORD Value: 1
Fix: F-46042r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings -> "Turn off handwriting recognition error reporting" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN12-CC-000054
- Vuln IDs
-
- V-15705
- Rule IDs
-
- SV-53131r1_rule
Checks: C-47437r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Power\PowerSettings\0e796bdb-100d-47d6-a2d5-f7d2daa51f51\ Value Name: DCSettingIndex Type: REG_DWORD Value: 1
Fix: F-46057r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Power Management -> Sleep Settings -> "Require a password when a computer wakes (on battery)" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN12-CC-000055
- Vuln IDs
-
- V-15706
- Rule IDs
-
- SV-53132r1_rule
Checks: C-47438r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Power\PowerSettings\0e796bdb-100d-47d6-a2d5-f7d2daa51f51\ Value Name: ACSettingIndex Type: REG_DWORD Value: 1
Fix: F-46058r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Power Management -> Sleep Settings -> "Require a password when a computer wakes (plugged in)" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000062
- Vuln IDs
-
- V-15707
- Rule IDs
-
- SV-53133r1_rule
Checks: C-47439r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: LoggingEnabled Type: REG_DWORD Value: 1
Fix: F-46059r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Assistance -> "Turn on session logging" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000111
- Vuln IDs
-
- V-15713
- Rule IDs
-
- SV-53134r2_rule
Checks: C-47440r4_chk
If the following registry value exists and is set to "1" (Basic) or "2" (Advanced), this is a finding: If the registry value does not exist, this is not a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet\ Value Name: SpyNetReporting Type: REG_DWORD Value: 1 or 2 = a Finding
Fix: F-62313r2_fix
Windows 2012 R2: Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Defender -> MAPS -> "Join Microsoft MAPS" to "Disabled". Windows 2012: Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Defender -> "Configure Microsoft Active Protection Service Reporting" to "Disabled".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000003
- Vuln IDs
-
- V-15714
- Rule IDs
-
- SV-53135r2_rule
Checks: C-47441r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: LoggingDisabled Type: REG_DWORD Value: 0
Fix: F-46061r3_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> "Disable logging" to "Disabled".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000002
- Vuln IDs
-
- V-15715
- Rule IDs
-
- SV-71721r1_rule
Checks: C-58139r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: Disabled Type: REG_DWORD Value: 0
Fix: F-62501r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> "Disable Windows Error Reporting" to "Disabled".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000004
- Vuln IDs
-
- V-15717
- Rule IDs
-
- SV-53136r2_rule
Checks: C-58153r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: DontSendAdditionalData Type: REG_DWORD Value: 0
Fix: F-62513r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> "Do not send additional data" to "Disabled".
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN12-CC-000090
- Vuln IDs
-
- V-15718
- Rule IDs
-
- SV-53137r1_rule
Checks: C-47443r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Explorer\ Value Name: NoHeapTerminationOnCorruption Type: REG_DWORD Value: 0
Fix: F-46063r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> File Explorer -> "Turn off heap termination on corruption" to "Disabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000119
- Vuln IDs
-
- V-15719
- Rule IDs
-
- SV-53138r3_rule
Checks: C-61745r2_chk
If the system is not a member of a domain, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: ReportControllerMissing Type: REG_DWORD Value: 1
Fix: F-66509r2_fix
If the system is not a member of a domain, this is NA. Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Logon Options >> "Report when logon server was not available during user logon" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000120
- Vuln IDs
-
- V-15722
- Rule IDs
-
- SV-53139r1_rule
Checks: C-47445r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\WMDRM\ Value Name: DisableOnline Type: REG_DWORD Value: 1
Fix: F-46065r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Media Digital Rights Management -> "Prevent Windows Media DRM Internet Access" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-UC-000012
- Vuln IDs
-
- V-15727
- Rule IDs
-
- SV-53140r2_rule
Checks: C-47446r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\ Value Name: NoInPlaceSharing Type: REG_DWORD Value: 1
Fix: F-46066r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> Windows Components -> Network Sharing -> "Prevent users from sharing files within their profile" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-GE-000020
- Vuln IDs
-
- V-15823
- Rule IDs
-
- SV-53141r2_rule
Checks: C-47447r2_chk
Search all drives for *.p12 and *.pfx files. If any files with these extensions exist, this is a finding. This does not apply to server-based applications that have a requirement for .p12 certificate files (e.g., Oracle Wallet Manager). Some applications create files with extensions of .p12 that are NOT certificate installation files. Removal of noncertificate installation files from systems is not required. These must be documented with the ISSO.
Fix: F-46067r1_fix
Remove any certificate installation files (*.p12 and *.pfx) found on a system. This does not apply to server-based applications that have a requirement for .p12 certificate files (e.g., Oracle Wallet Manager).
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN12-SO-000086
- Vuln IDs
-
- V-15991
- Rule IDs
-
- SV-52223r2_rule
Checks: C-46966r1_chk
UAC requirements are NA on Server Core installations. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: EnableUIADesktopToggle Value Type: REG_DWORD Value: 0
Fix: F-45241r1_fix
UAC requirements are NA on Server Core installations. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" to "Disabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN12-CC-000132
- Vuln IDs
-
- V-15997
- Rule IDs
-
- SV-52224r2_rule
Checks: C-46967r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fDisableCcm Type: REG_DWORD Value: 1
Fix: F-45242r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Device and Resource Redirection -> "Do not allow COM port redirection" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN12-CC-000133
- Vuln IDs
-
- V-15998
- Rule IDs
-
- SV-52226r2_rule
Checks: C-46968r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fDisableLPT Type: REG_DWORD Value: 1
Fix: F-45244r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Device and Resource Redirection -> "Do not allow LPT port redirection" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN12-CC-000135
- Vuln IDs
-
- V-15999
- Rule IDs
-
- SV-52229r2_rule
Checks: C-46969r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fDisablePNPRedir Type: REG_DWORD Value: 1
Fix: F-45246r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Device and Resource Redirection -> "Do not allow supported Plug and Play device redirection" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN12-CC-000134
- Vuln IDs
-
- V-16000
- Rule IDs
-
- SV-52230r2_rule
Checks: C-46970r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fEnableSmartCard Type: REG_DWORD Value: 1
Fix: F-45247r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Device and Resource Redirection -> "Do not allow smart card device redirection" to "Disabled".
- RMF Control
- AC-17
- Severity
- L
- CCI
- CCI-002314
- Version
- WN12-CC-000137
- Vuln IDs
-
- V-16005
- Rule IDs
-
- SV-52232r2_rule
Checks: C-46971r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\ Value Name: NoDisconnect Type: REG_DWORD Value: 1
Fix: F-45248r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Remote Session Environment -> "Remove "Disconnect" option from Shut Down dialog" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN12-SO-000081
- Vuln IDs
-
- V-16008
- Rule IDs
-
- SV-53142r1_rule
Checks: C-47448r1_chk
UAC requirements are NA on Server Core installations. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: ValidateAdminCodeSignatures Value Type: REG_DWORD Value: 0
Fix: F-46068r2_fix
UAC requirements are NA on Server Core installations. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Only elevate executables that are signed and validated" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000045
- Vuln IDs
-
- V-16020
- Rule IDs
-
- SV-53143r1_rule
Checks: C-47449r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\SQMClient\Windows\ Value Name: CEIPEnable Type: REG_DWORD Value: 0
Fix: F-46069r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication Settings -> "Turn off Windows Customer Experience Improvement Program" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-UC-000007
- Vuln IDs
-
- V-16021
- Rule IDs
-
- SV-53144r1_rule
Checks: C-47450r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Policies\Microsoft\Assistance\Client\1.0\ Value Name: NoImplicitFeedback Type: REG_DWORD Value: 1
Fix: F-46070r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication Settings -> "Turn off Help Experience Improvement Program" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-UC-000008
- Vuln IDs
-
- V-16048
- Rule IDs
-
- SV-53145r1_rule
Checks: C-47451r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Policies\Microsoft\Assistance\Client\1.0\ Value Name: NoExplicitFeedback Type: REG_DWORD Value: 1
Fix: F-46071r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication Settings -> "Turn off Help Ratings" to "Enabled".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN12-UR-000016
- Vuln IDs
-
- V-18010
- Rule IDs
-
- SV-52115r2_rule
Checks: C-46932r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Debug programs" user right, this is a finding: Administrators
Fix: F-45140r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Debug programs" to only include the following accounts or groups: Administrators
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000035
- Vuln IDs
-
- V-21950
- Rule IDs
-
- SV-53175r1_rule
Checks: C-47481r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\LanmanServer\Parameters\ Value Name: SmbServerNameHardeningLevel Type: REG_DWORD Value: 0
Fix: F-46101r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Microsoft network server: Server SPN target name validation level" to "Off".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- WN12-SO-000061
- Vuln IDs
-
- V-21951
- Rule IDs
-
- SV-53176r1_rule
Checks: C-47482r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\LSA\ Value Name: UseMachineId Type: REG_DWORD Value: 1
Fix: F-46102r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network security: Allow Local System to use computer identity for NTLM" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000062
- Vuln IDs
-
- V-21952
- Rule IDs
-
- SV-53177r1_rule
Checks: C-47483r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\LSA\MSV1_0\ Value Name: allownullsessionfallback Type: REG_DWORD Value: 0
Fix: F-46103r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network security: Allow LocalSystem NULL session fallback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000063
- Vuln IDs
-
- V-21953
- Rule IDs
-
- SV-53178r1_rule
Checks: C-47484r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\LSA\pku2u\ Value Name: AllowOnlineID Type: REG_DWORD Value: 0
Fix: F-46104r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network security: Allow PKU2U authentication requests to this computer to use online identities" to "Disabled".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- WN12-SO-000064
- Vuln IDs
-
- V-21954
- Rule IDs
-
- SV-53179r2_rule
Checks: C-61749r2_chk
Verify whether the registry key below exists. If it does not exist or the value is "0", this is not a finding. If the registry key exists and contains a value other than "0", continue below. The values are determined by the selection of encryption suites in the policy Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network Security: Configure encryption types allowed for Kerberos". Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\ Value Name: SupportedEncryptionTypes Type: REG_DWORD Due to the number of possible combinations that may include the DES encryption types, it is not possible to include all acceptable values as viewed directly in the registry. If the registry key does exist, the value must be converted to binary to determine configuration of specific bits. This will determine whether this is a finding. Note the value for the registry key. For example, when all suites, including the DES suites are selected, the value will be "0x7fffffff (2147483647)". Open the Windows calculator (Run/Search for "calc"). Select "View", then "Programmer". Select "Dword" and either "Hex" or "Dec". Enter the appropriate form of the value found for the registry key (e.g., Hex - enter 0x7fffffff, Dec - enter 2147483647) Select "Bin". The returned value may vary in length, up to 32 characters. If the either of 2 right most characters are "1", this is a finding. If the both of 2 right most characters are "0", this is not a finding.
Fix: F-66513r3_fix
The default system configuration does not use DES encryption for Kerberos and supports this requirement. If Kerberos encryption types must be configured, ensure the following are not selected: DES_CBC_CRC DES_CBC_MD5 If the policy for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Configure encryption types allowed for Kerberos" is configured, only the following selections are allowed: RC4_HMAC_MD5 AES128_HMAC_SHA1 AES256_HMAC_SHA1 Future encryption types
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-SO-000037
- Vuln IDs
-
- V-21955
- Rule IDs
-
- SV-53180r2_rule
Checks: C-47486r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ Value Name: DisableIPSourceRouting Type: REG_DWORD Value: 2
Fix: F-46106r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)" to "Highest protection, source routing is completely disabled". (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN12-SO-000047
- Vuln IDs
-
- V-21956
- Rule IDs
-
- SV-53181r2_rule
Checks: C-47487r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ Value Name: TcpMaxDataRetransmissions Value Type: REG_DWORD Value: 3 (or less)
Fix: F-46107r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)" to "3" or less. (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
- RMF Control
- SC-3
- Severity
- L
- CCI
- CCI-001084
- Version
- WN12-CC-000005
- Vuln IDs
-
- V-21960
- Rule IDs
-
- SV-53182r1_rule
Checks: C-47488r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Network Connections\ Value Name: NC_StdDomainUserSetLocation Type: REG_DWORD Value: 1
Fix: F-46108r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Network Connections -> "Require domain users to elevate when setting a network's location" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000006
- Vuln IDs
-
- V-21961
- Rule IDs
-
- SV-53183r1_rule
Checks: C-47489r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\TCPIP\v6Transition\ Value Name: Force_Tunneling Type: REG_SZ Value: Enabled
Fix: F-46109r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Network Connections -> "Route all traffic through the internal network" to "Enabled: Enabled State".
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- WN12-CC-000016
- Vuln IDs
-
- V-21963
- Rule IDs
-
- SV-53184r1_rule
Checks: C-47490r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Printers\ Value Name: DoNotInstallCompatibleDriverFromWindowsUpdate Type: REG_DWORD Value: 1
Fix: F-46110r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Printers -> "Extend Point and Print connection to search Windows Update" to "Disabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000022
- Vuln IDs
-
- V-21964
- Rule IDs
-
- SV-53185r2_rule
Checks: C-47491r3_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Device Metadata\ Value Name: PreventDeviceMetadataFromNetwork Value Type: REG_DWORD Value: 1
Fix: F-46111r3_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Device Installation >> "Prevent device metadata retrieval from the Internet" to "Enabled".
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- WN12-CC-000024
- Vuln IDs
-
- V-21965
- Rule IDs
-
- SV-53186r1_rule
Checks: C-47492r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\DriverSearching\ Value Name: SearchOrderConfig Type: REG_DWORD Value: 0
Fix: F-46112r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Device Installation -> "Specify search order for device driver source locations" to "Enabled: Do not search Windows Update".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000066
- Vuln IDs
-
- V-21967
- Rule IDs
-
- SV-53187r1_rule
Checks: C-47493r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\ScriptedDiagnosticsProvider\Policy\ Value Name: DisableQueryRemoteServer Type: REG_DWORD Value: 0
Fix: F-46113r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Troubleshooting and Diagnostics -> Microsoft Support Diagnostic Tool -> "Microsoft Support Diagnostic Tool: Turn on MSDT interactive communication with support provider" to "Disabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000067
- Vuln IDs
-
- V-21969
- Rule IDs
-
- SV-53188r1_rule
Checks: C-47494r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\ScriptedDiagnosticsProvider\Policy\ Value Name: EnableQueryRemoteServer Type: REG_DWORD Value: 0
Fix: F-46114r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Troubleshooting and Diagnostics -> Scripted Diagnostics -> "Troubleshooting: Allow users to access online troubleshooting content on Microsoft servers from the Troubleshooting Control Panel (via the Windows Online Troubleshooting Service - WOTS)" to "Disabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000068
- Vuln IDs
-
- V-21970
- Rule IDs
-
- SV-53128r1_rule
Checks: C-47434r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\WDI\{9c5a40da-b965-4fc3-8781-88dd50a6299d}\ Value Name: ScenarioExecutionEnabled Type: REG_DWORD Value: 0
Fix: F-46054r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Troubleshooting and Diagnostics -> Windows Performance PerfTrack -> "Enable/Disable PerfTrack" to "Disabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000071
- Vuln IDs
-
- V-21971
- Rule IDs
-
- SV-53127r1_rule
Checks: C-47433r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\AppCompat\ Value Name: DisableInventory Type: REG_DWORD Value: 1
Fix: F-46053r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Application Compatibility -> "Turn off Inventory Collector" to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN12-CC-000072
- Vuln IDs
-
- V-21973
- Rule IDs
-
- SV-53126r2_rule
Checks: C-47432r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Explorer\ Value Name: NoAutoplayfornonVolume Type: REG_DWORD Value: 1
Fix: F-46052r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> AutoPlay Policies -> "Disallow Autoplay for non-volume devices" to "Enabled".
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- WN12-CC-000089
- Vuln IDs
-
- V-21980
- Rule IDs
-
- SV-53125r1_rule
Checks: C-47431r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Explorer\ Value Name: NoDataExecutionPrevention Type: REG_DWORD Value: 0
Fix: F-46051r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> File Explorer -> "Turn off Data Execution Prevention for Explorer" to "Disabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN12-CC-000073
- Vuln IDs
-
- V-22692
- Rule IDs
-
- SV-53124r2_rule
Checks: C-47430r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ Value Name: NoAutorun Type: REG_DWORD Value: 1
Fix: F-46050r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> AutoPlay Policies -> "Set the default behavior for AutoRun" to "Enabled:Do not execute any autorun commands".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN12-RG-000001
- Vuln IDs
-
- V-26070
- Rule IDs
-
- SV-53123r2_rule
Checks: C-47429r1_chk
Navigate to the following registry key and review the assigned permissions: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Standard user accounts and groups must only have Read permissions to this registry key. If any standard user accounts or groups have greater permissions, this is a finding. The default permissions satisfy this requirement.
Fix: F-46049r1_fix
Ensure only Read permissions are assigned to standard user accounts and groups for the following registry key. The default configuration satisfies this requirement. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-SO-000051
- Vuln IDs
-
- V-26283
- Rule IDs
-
- SV-53122r1_rule
Checks: C-47428r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Control\Lsa\ Value Name: RestrictAnonymousSAM Value Type: REG_DWORD Value: 1
Fix: F-46048r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network access: Do not allow anonymous enumeration of SAM accounts" to "Enabled".
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- WN12-SO-000023
- Vuln IDs
-
- V-26359
- Rule IDs
-
- SV-53121r2_rule
Checks: C-47427r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: LegalNoticeCaption Value Type: REG_SZ Value: See message title options below "DoD Notice and Consent Banner", "US Department of Defense Warning Statement", or a site-defined equivalent. If a site-defined title is used, it can in no case contravene or modify the language of the banner text required in V-1089. Automated tools may only search for the titles defined above. If a site-defined title is used, a manual review will be required.
Fix: F-46047r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Interactive Logon: Message title for users attempting to log on" to "DoD Notice and Consent Banner", "US Department of Defense Warning Statement", or a site-defined equivalent. If a site-defined title is used, it can in no case contravene or modify the language of the banner text required in V-1089.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000001
- Vuln IDs
-
- V-26469
- Rule IDs
-
- SV-53120r1_rule
Checks: C-47426r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups are granted the "Access Credential Manager as a trusted caller" user right, this is a finding.
Fix: F-46046r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Access Credential Manager as a trusted caller" to be defined but containing no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN12-UR-000002-MS
- Vuln IDs
-
- V-26470
- Rule IDs
-
- SV-51499r3_rule
Checks: C-49426r2_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Access this computer from the network" user right, this is a finding: Administrators Authenticated Users Systems dedicated to managing Active Directory (AD admin platforms, see V-36436 in the Active Directory Domain STIG), must only allow Administrators, removing the Authenticated Users group.
Fix: F-49518r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Access this computer from the network" to only include the following accounts or groups: Administrators Authenticated Users Systems dedicated to managing Active Directory (AD admin platforms, see V-36436 in the Active Directory Domain STIG), must only allow Administrators, removing the Authenticated Users group.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000004
- Vuln IDs
-
- V-26471
- Rule IDs
-
- SV-52109r2_rule
Checks: C-46926r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Adjust memory quotas for a process" user right, this is a finding: Administrators Local Service Network Service
Fix: F-45134r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Adjust memory quotas for a process" to only include the following accounts or groups: Administrators Local Service Network Service
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN12-UR-000005
- Vuln IDs
-
- V-26472
- Rule IDs
-
- SV-52110r2_rule
Checks: C-46927r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Allow log on locally" user right, this is a finding: Administrators
Fix: F-45135r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Allow log on locally" to only include the following accounts or groups: Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN12-UR-000006
- Vuln IDs
-
- V-26473
- Rule IDs
-
- SV-53119r1_rule
Checks: C-47425r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Allow log on through Remote Desktop Services" user right, this is a finding: Administrators If the system serves the Remote Desktop Services role, the Remote Desktop Users group may be included.
Fix: F-46045r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Allow log on through Remote Desktop Services" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000007
- Vuln IDs
-
- V-26474
- Rule IDs
-
- SV-52111r2_rule
Checks: C-46928r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Back up files and directories" user right, this is a finding: Administrators
Fix: F-45136r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Back up files and directories" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- L
- CCI
- CCI-002235
- Version
- WN12-UR-000008
- Vuln IDs
-
- V-26475
- Rule IDs
-
- SV-52112r2_rule
Checks: C-46929r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Bypass traverse checking" user right, this is a finding: Administrators Authenticated Users Local Service Network Service Window Manager\Window Manager Group
Fix: F-45137r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Bypass traverse checking" to only include the following accounts or groups: Administrators Authenticated Users Local Service Network Service Window Manager\Window Manager Group
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000009
- Vuln IDs
-
- V-26476
- Rule IDs
-
- SV-53118r1_rule
Checks: C-47424r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Change the system time" user right, this is a finding: Administrators Local Service
Fix: F-46044r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Change the system time" to only include the following accounts or groups: Administrators Local Service
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-UR-000010
- Vuln IDs
-
- V-26477
- Rule IDs
-
- SV-53117r1_rule
Checks: C-47423r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Change the time zone" user right, this is a finding: Administrators Local Service
Fix: F-46043r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Change the time zone" to only include the following accounts or groups: Administrators Local Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000011
- Vuln IDs
-
- V-26478
- Rule IDs
-
- SV-53063r1_rule
Checks: C-47369r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Create a pagefile" user right, this is a finding: Administrators
Fix: F-45989r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Create a pagefile" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN12-UR-000012
- Vuln IDs
-
- V-26479
- Rule IDs
-
- SV-52113r2_rule
Checks: C-46930r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups are granted the "Create a token object" user right, this is a finding.
Fix: F-45138r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Create a token object" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000013
- Vuln IDs
-
- V-26480
- Rule IDs
-
- SV-52114r2_rule
Checks: C-46931r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Create global objects" user right, this is a finding: Administrators Service Local Service Network Service
Fix: F-45139r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Create global objects" to only include the following accounts or groups: Administrators Service Local Service Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000014
- Vuln IDs
-
- V-26481
- Rule IDs
-
- SV-53059r1_rule
Checks: C-47365r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups are granted the "Create permanent shared objects" user right, this is a finding.
Fix: F-45985r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Create permanent shared objects" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000015
- Vuln IDs
-
- V-26482
- Rule IDs
-
- SV-53054r2_rule
Checks: C-61747r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment. If any accounts or groups other than the following are granted the "Create symbolic links" user right, this is a finding: Administrators Systems that have the Hyper-V role will also have "Virtual Machines" given this user right (this may be displayed as "NT Virtual Machine\Virtual Machines"). This is not a finding.
Fix: F-66511r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create symbolic links" to only include the following accounts or groups: Administrators Systems that have the Hyper-V role will also have "Virtual Machines" given this user right. If this needs to be added manually, enter it as "NT Virtual Machine\Virtual Machines".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN12-UR-000018-MS
- Vuln IDs
-
- V-26483
- Rule IDs
-
- SV-51502r1_rule
Checks: C-46807r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If the following accounts or groups are not defined for the "Deny log on as a batch job" user right, this is a finding: Domain Systems Only: Enterprise Admins Group Domain Admins Group All Systems: Guests Group
Fix: F-44652r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Deny log on as a batch job" to include the following: Domain Systems Only: Enterprise Admins Group Domain Admins Group All Systems: Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN12-UR-000019-MS
- Vuln IDs
-
- V-26484
- Rule IDs
-
- SV-51504r1_rule
Checks: C-46808r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If the following accounts or groups are not defined for the "Deny log on as a service" user right on domain-joined systems, this is a finding: Enterprise Admins Group Domain Admins Group If any accounts or groups are defined for the "Deny log on as a service" user right on non-domain-joined systems, this is a finding.
Fix: F-44654r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Deny log on as a service" to include the following for domain-joined systems: Enterprise Admins Group Domain Admins Group Configure the "Deny log on as a service" for nondomain systems to include no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN12-UR-000020-MS
- Vuln IDs
-
- V-26485
- Rule IDs
-
- SV-51508r2_rule
Checks: C-49587r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If the following accounts or groups are not defined for the "Deny log on locally" user right, this is a finding: Domain Systems Only: Enterprise Admins Group Domain Admins Group Systems dedicated to the management of Active Directory (AD admin platforms, see V-36436 in the Active Directory Domain STIG) are exempt from this. All Systems: Guests Group
Fix: F-49929r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Deny log on locally" to include the following: Domain Systems Only: Enterprise Admins Group Domain Admins Group Systems dedicated to the management of Active Directory (AD admin platforms, see V-36436 in the Active Directory Domain STIG) are exempt from this. All Systems: Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN12-UR-000021-MS
- Vuln IDs
-
- V-26486
- Rule IDs
-
- SV-51509r3_rule
Checks: C-58027r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If the following accounts or groups are not defined for the "Deny log on through Remote Desktop Services" user right, this is a finding: Domain Systems Only: Enterprise Admins group Domain Admins group All Local Administrator Accounts: *Systems with the new built-in security groups - use "Local account" or "Local account and member of Administrators group". **Systems that do not have the new built-in security groups - use the "DenyNetworkAccess" or "DeniedNetworkAccess" group (see V-45589). Do not use the built-in Administrators group. This group must contain the appropriate accounts/groups responsible for administering the system. All Systems: Guests group Systems dedicated to the management of Active Directory (AD admin platforms, see V-36436 in the Active Directory Domain STIG) are exempt from denying the Enterprise Admins and Domain Admins groups. *Windows 8.1 and Windows Server 2012 R2 added new built-in security groups, "Local account" and "Local account and member of Administrators group" for assigning permissions and rights to local accounts. Microsoft Security Advisory Patch 2871997 adds these groups to Windows 7, Windows 8, Windows Server 2008 R2 and Windows Server 2012. Assign the group "Local account and member of Administrators group" or the more restrictive "Local account". **Documentation and scripts supporting the use of this group to restrict local administrative accounts was changed at one point. The original name "DeniedNetworkAccess", was changed to "DenyNetworkAccess". Automated benchmarks will look for these groups. Use of other methods will require manual validation.
Fix: F-62389r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Deny log on through Remote Desktop Services" to include the following: Domain Systems Only: Enterprise Admins group Domain Admins group *All Local Administrator Accounts: *Systems with the new built-in security groups - use "Local account" or "Local account and member of Administrators group". **Systems that do not have the new built-in security groups - use the "DenyNetworkAccess" or "DeniedNetworkAccess" group (see V-45589). Do not use the built-in Administrators group. This group must contain the appropriate accounts/groups responsible for administering the system. All Systems: Guests group Systems dedicated to the management of Active Directory (AD admin platforms, see V-36436 in the Active Directory Domain STIG) are exempt from denying the Enterprise Admins and Domain Admins groups. *Windows 8.1 and Windows Server 2012 R2 added new built-in security groups, "Local account" and "Local account and member of Administrators group" for assigning permissions and rights to local accounts. Microsoft Security Advisory Patch 2871997 adds these groups to Windows 7, Windows 8, Windows Server 2008 R2 and Windows Server 2012. Assign the group "Local account and member of Administrators group" or the more restrictive "Local account". **Documentation and scripts supporting the use of this group to restrict local administrative accounts was changed at one point. The original name "DeniedNetworkAccess", was changed to "DenyNetworkAccess". Automated benchmarks will look for these groups. Use of other methods will require manual validation.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000022-MS
- Vuln IDs
-
- V-26487
- Rule IDs
-
- SV-51500r1_rule
Checks: C-46805r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups are granted the "Enable computer and user accounts to be trusted for delegation" user right, this is a finding.
Fix: F-44649r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Enable computer and user accounts to be trusted for delegation" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000023
- Vuln IDs
-
- V-26488
- Rule IDs
-
- SV-53050r1_rule
Checks: C-47356r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Force shutdown from a remote system" user right, this is a finding: Administrators
Fix: F-45976r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Force shutdown from a remote system" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000024
- Vuln IDs
-
- V-26489
- Rule IDs
-
- SV-52116r2_rule
Checks: C-46933r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Generate security audits" user right, this is a finding: Local Service Network Service
Fix: F-45141r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Generate security audits" to only include the following accounts or groups: Local Service Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000025
- Vuln IDs
-
- V-26490
- Rule IDs
-
- SV-52117r2_rule
Checks: C-46934r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Impersonate a client after authentication" user right, this is a finding: Administrators Service Local Service Network Service
Fix: F-45142r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Impersonate a client after authentication" to only include the following accounts or groups: Administrators Service Local Service Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000026
- Vuln IDs
-
- V-26491
- Rule IDs
-
- SV-53047r1_rule
Checks: C-47353r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Increase a process working set" user right, this is a finding: Administrators Local Service Window Manager\Window Manager Group
Fix: F-45973r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Increase a process working set" to only include the following accounts or groups: Administrators Local Service Window Manager\Window Manager Group
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000027
- Vuln IDs
-
- V-26492
- Rule IDs
-
- SV-52118r2_rule
Checks: C-46936r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Increase scheduling priority" user right, this is a finding: Administrators
Fix: F-45143r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Increase scheduling priority" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000028
- Vuln IDs
-
- V-26493
- Rule IDs
-
- SV-53043r1_rule
Checks: C-47349r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Load and unload device drivers" user right, this is a finding: Administrators
Fix: F-45969r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Load and unload device drivers" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000029
- Vuln IDs
-
- V-26494
- Rule IDs
-
- SV-52119r2_rule
Checks: C-46937r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups are granted the "Lock pages in memory" user right, this is a finding.
Fix: F-45144r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Lock pages in memory" to be defined but containing no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN12-UR-000030
- Vuln IDs
-
- V-26495
- Rule IDs
-
- SV-52120r2_rule
Checks: C-46938r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Log on as a batch job" user right, this is a finding: Administrators
Fix: F-45145r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Log on as a batch job" to only include the following accounts or groups: Administrators
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN12-UR-000032
- Vuln IDs
-
- V-26496
- Rule IDs
-
- SV-53039r2_rule
Checks: C-47345r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Manage auditing and security log" user right, this is a finding: Administrators If the site has an Auditors group that further limits this privilege this would not be a finding.
Fix: F-45965r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Manage auditing and security log" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000033
- Vuln IDs
-
- V-26497
- Rule IDs
-
- SV-53033r1_rule
Checks: C-47338r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups are granted the "Modify an object label" user right, this is a finding.
Fix: F-45958r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Modify an object label" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000034
- Vuln IDs
-
- V-26498
- Rule IDs
-
- SV-53029r1_rule
Checks: C-47334r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Modify firmware environment values" user right, this is a finding: Administrators
Fix: F-45955r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Modify firmware environment values" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000035
- Vuln IDs
-
- V-26499
- Rule IDs
-
- SV-53025r1_rule
Checks: C-47330r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Perform volume maintenance tasks" user right, this is a finding: Administrators
Fix: F-45951r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Perform volume maintenance tasks" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000036
- Vuln IDs
-
- V-26500
- Rule IDs
-
- SV-53022r1_rule
Checks: C-47328r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Profile single process" user right, this is a finding: Administrators
Fix: F-45948r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Profile single process" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000037
- Vuln IDs
-
- V-26501
- Rule IDs
-
- SV-53019r1_rule
Checks: C-47325r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Profile system performance" user right, this is a finding: Administrators NT Service\WdiServiceHost
Fix: F-45945r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Profile system performance" to only include the following accounts or groups: Administrators NT Service\WdiServiceHost
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000039
- Vuln IDs
-
- V-26503
- Rule IDs
-
- SV-52121r2_rule
Checks: C-46939r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Replace a process level token" user right, this is a finding: Local Service Network Service
Fix: F-45146r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Replace a process level token" to only include the following accounts or groups: Local Service Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000040
- Vuln IDs
-
- V-26504
- Rule IDs
-
- SV-52122r2_rule
Checks: C-46940r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Restore files and directories" user right, this is a finding: Administrators
Fix: F-45147r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Restore files and directories" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000041
- Vuln IDs
-
- V-26505
- Rule IDs
-
- SV-53016r1_rule
Checks: C-47323r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Shut down the system" user right, this is a finding: Administrators
Fix: F-45943r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Shut down the system" to only include the following accounts or groups: Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN12-UR-000042
- Vuln IDs
-
- V-26506
- Rule IDs
-
- SV-52123r2_rule
Checks: C-46941r1_chk
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Take ownership of files or other objects" user right, this is a finding: Administrators
Fix: F-45148r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Take ownership of files or other objects" to only include the following accounts or groups: Administrators
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000001
- Vuln IDs
-
- V-26529
- Rule IDs
-
- SV-53013r2_rule
Checks: C-47320r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Account Logon -> Credential Validation - Success
Fix: F-45940r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Account Logon -> "Audit Credential Validation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000002
- Vuln IDs
-
- V-26530
- Rule IDs
-
- SV-53011r2_rule
Checks: C-47318r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Account Logon -> Credential Validation - Failure
Fix: F-45938r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Account Logon -> "Audit Credential Validation" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000011
- Vuln IDs
-
- V-26531
- Rule IDs
-
- SV-52234r3_rule
Checks: C-46972r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Account Management -> Computer Account Management - Success
Fix: F-45249r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Account Management -> "Audit Computer Account Management" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000012
- Vuln IDs
-
- V-26532
- Rule IDs
-
- SV-52235r3_rule
Checks: C-46973r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Account Management -> Computer Account Management - Failure
Fix: F-45250r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Account Management -> "Audit Computer Account Management" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000015
- Vuln IDs
-
- V-26533
- Rule IDs
-
- SV-53009r1_rule
Checks: C-47317r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Account Management -> Other Account Management Events - Success
Fix: F-45936r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Account Management -> "Audit Other Account Management Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000016
- Vuln IDs
-
- V-26534
- Rule IDs
-
- SV-53008r1_rule
Checks: C-47315r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Account Management -> Other Account Management Events - Failure
Fix: F-45935r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Account Management -> "Audit Other Account Management Events" with "Failure" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN12-AU-000017
- Vuln IDs
-
- V-26535
- Rule IDs
-
- SV-53007r2_rule
Checks: C-47314r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Account Management -> Security Group Management - Success
Fix: F-45934r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Account Management -> "Audit Security Group Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN12-AU-000018
- Vuln IDs
-
- V-26536
- Rule IDs
-
- SV-53005r2_rule
Checks: C-47312r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Account Management -> Security Group Management - Failure
Fix: F-45932r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Account Management -> "Audit Security Group Management" with "Failure" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN12-AU-000019
- Vuln IDs
-
- V-26537
- Rule IDs
-
- SV-53003r2_rule
Checks: C-47310r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Account Management -> User Account Management - Success
Fix: F-45930r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Account Management -> "Audit User Account Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN12-AU-000020
- Vuln IDs
-
- V-26538
- Rule IDs
-
- SV-53001r2_rule
Checks: C-47308r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Account Management -> User Account Management - Failure
Fix: F-45928r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Account Management -> "Audit User Account Management" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000023
- Vuln IDs
-
- V-26539
- Rule IDs
-
- SV-52999r1_rule
Checks: C-47306r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Detailed Tracking -> Process Creation - Success
Fix: F-45926r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Detailed Tracking -> "Audit Process Creation" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN12-AU-000045
- Vuln IDs
-
- V-26540
- Rule IDs
-
- SV-52996r2_rule
Checks: C-47303r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Logon/Logoff -> Logoff - Success
Fix: F-45923r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Logon/Logoff -> "Audit Logoff" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN12-AU-000047
- Vuln IDs
-
- V-26541
- Rule IDs
-
- SV-52994r2_rule
Checks: C-47301r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Logon/Logoff -> Logon - Success
Fix: F-45921r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Logon/Logoff -> "Audit Logon" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN12-AU-000048
- Vuln IDs
-
- V-26542
- Rule IDs
-
- SV-52993r2_rule
Checks: C-47300r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Logon/Logoff -> Logon - Failure
Fix: F-45920r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Logon/Logoff -> "Audit Logon" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000053
- Vuln IDs
-
- V-26543
- Rule IDs
-
- SV-52987r1_rule
Checks: C-47293r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Logon/Logoff -> Special Logon - Success
Fix: F-45913r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Logon/Logoff -> "Audit Special Logon" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000068
- Vuln IDs
-
- V-26544
- Rule IDs
-
- SV-52986r1_rule
Checks: C-47292r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Object Access -> File System - Failure
Fix: F-45912r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Object Access -> "Audit File System" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000080
- Vuln IDs
-
- V-26545
- Rule IDs
-
- SV-52984r1_rule
Checks: C-47290r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Object Access -> Registry - Failure
Fix: F-45910r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Object Access -> "Audit Registry" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000085
- Vuln IDs
-
- V-26546
- Rule IDs
-
- SV-52983r1_rule
Checks: C-47289r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Policy Change -> Audit Policy Change - Success
Fix: F-45909r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Policy Change -> "Audit Audit Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000086
- Vuln IDs
-
- V-26547
- Rule IDs
-
- SV-52982r1_rule
Checks: C-47288r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Policy Change -> Audit Policy Change - Failure
Fix: F-45908r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Policy Change -> "Audit Audit Policy Change" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000087
- Vuln IDs
-
- V-26548
- Rule IDs
-
- SV-52981r1_rule
Checks: C-47287r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Policy Change -> Authentication Policy Change - Success
Fix: F-45907r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Policy Change -> "Audit Authentication Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000101
- Vuln IDs
-
- V-26549
- Rule IDs
-
- SV-52980r1_rule
Checks: C-47286r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Privilege Use -> Sensitive Privilege Use - Success
Fix: F-45906r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Privilege Use -> "Audit Sensitive Privilege Use" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000102
- Vuln IDs
-
- V-26550
- Rule IDs
-
- SV-52979r1_rule
Checks: C-47285r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Privilege Use -> Sensitive Privilege Use - Failure
Fix: F-45905r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Privilege Use -> "Audit Sensitive Privilege Use" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000103
- Vuln IDs
-
- V-26551
- Rule IDs
-
- SV-52978r1_rule
Checks: C-47284r2_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. System -> IPsec Driver - Success
Fix: F-45904r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> System -> "Audit IPsec Driver" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000104
- Vuln IDs
-
- V-26552
- Rule IDs
-
- SV-52977r1_rule
Checks: C-47283r2_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. System -> IPsec Driver - Failure
Fix: F-45903r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> System -> "Audit IPsec Driver" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000107
- Vuln IDs
-
- V-26553
- Rule IDs
-
- SV-52976r1_rule
Checks: C-47282r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. System -> Security State Change - Success
Fix: F-45902r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> System -> "Audit Security State Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000108
- Vuln IDs
-
- V-26554
- Rule IDs
-
- SV-52975r1_rule
Checks: C-47281r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. System -> Security State Change - Failure
Fix: F-45901r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> System -> "Audit Security State Change" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000109
- Vuln IDs
-
- V-26555
- Rule IDs
-
- SV-52974r1_rule
Checks: C-47280r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. System -> Security System Extension - Success
Fix: F-45900r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> System -> "Audit Security System Extension" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000110
- Vuln IDs
-
- V-26556
- Rule IDs
-
- SV-52973r1_rule
Checks: C-47279r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. System -> Security System Extension - Failure
Fix: F-45899r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> System -> "Audit Security System Extension" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000111
- Vuln IDs
-
- V-26557
- Rule IDs
-
- SV-52972r1_rule
Checks: C-47278r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. System -> System Integrity - Success
Fix: F-45898r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> System -> "Audit System Integrity" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000112
- Vuln IDs
-
- V-26558
- Rule IDs
-
- SV-52971r1_rule
Checks: C-47277r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. System -> System Integrity - Failure
Fix: F-45897r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> System -> "Audit System Integrity" with "Failure" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000007
- Vuln IDs
-
- V-26575
- Rule IDs
-
- SV-52970r1_rule
Checks: C-47276r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\TCPIP\v6Transition\ Value Name: 6to4_State Type: REG_SZ Value: Disabled
Fix: F-45896r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> TCPIP Settings -> IPv6 Transition Technologies -> "Set 6to4 State" to "Enabled: Disabled State".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000008
- Vuln IDs
-
- V-26576
- Rule IDs
-
- SV-52969r1_rule
Checks: C-47275r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\TCPIP\v6Transition\IPHTTPS\IPHTTPSInterface\ Value Name: IPHTTPS_ClientState Type: REG_DWORD Value: 3
Fix: F-45895r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> TCPIP Settings -> IPv6 Transition Technologies -> "Set IP-HTTPS State" to "Enabled: Disabled State". Note: "IPHTTPS URL:" must be entered in the policy even if set to Disabled State. Enter "about:blank".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000009
- Vuln IDs
-
- V-26577
- Rule IDs
-
- SV-52968r1_rule
Checks: C-47274r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\TCPIP\v6Transition\ Value Name: ISATAP_State Type: REG_SZ Value: Disabled
Fix: F-45894r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> TCPIP Settings -> IPv6 Transition Technologies -> "Set ISATAP State" to "Enabled: Disabled State".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN12-CC-000010
- Vuln IDs
-
- V-26578
- Rule IDs
-
- SV-52967r1_rule
Checks: C-47273r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\TCPIP\v6Transition\ Value Name: Teredo_State Type: REG_SZ Value: Disabled
Fix: F-45893r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> TCPIP Settings -> IPv6 Transition Technologies -> "Set Teredo State" to "Enabled: Disabled State".
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN12-CC-000084
- Vuln IDs
-
- V-26579
- Rule IDs
-
- SV-52966r1_rule
Checks: C-47272r3_chk
If the system is configured to write events directly to an audit server, this is NA. If the following registry value does not exist or is not configured to at least the value specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\EventLog\Application\ Value Name: MaxSize Type: REG_DWORD Value: 32768
Fix: F-45892r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Event Log Service -> Application -> "Specify the maximum log size (KB)" to at minimum "Enabled:32768".
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN12-CC-000085
- Vuln IDs
-
- V-26580
- Rule IDs
-
- SV-52965r1_rule
Checks: C-47271r3_chk
If the system is configured to write events directly to an audit server, this is NA. If the following registry value does not exist or is not configured to at least the value specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\EventLog\Security\ Value Name: MaxSize Type: REG_DWORD Value: 196608
Fix: F-45891r1_fix
If the system is not configured to write directly to an audit server, configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Event Log Service -> Security -> "Specify the maximum log size (KB)" to at minimum "Enabled:196608".
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN12-CC-000086
- Vuln IDs
-
- V-26581
- Rule IDs
-
- SV-52964r1_rule
Checks: C-47270r2_chk
If the system is configured to write events directly to an audit server, this is NA. If the following registry value does not exist or is not configured to at least the value specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\EventLog\Setup\ Value Name: MaxSize Type: REG_DWORD Value: 32768
Fix: F-45890r1_fix
If the system is not configured to write directly to an audit server, configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Event Log Service -> Setup -> "Specify the maximum log size (KB)" to at minimum "Enabled:32768".
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN12-CC-000087
- Vuln IDs
-
- V-26582
- Rule IDs
-
- SV-52963r1_rule
Checks: C-47269r2_chk
If the system is configured to write events directly to an audit server, this is NA. If the following registry value does not exist or is not configured to at least the value specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\EventLog\System\ Value Name: MaxSize Type: REG_DWORD Value: 32768
Fix: F-45889r1_fix
If the system is not configured to write directly to an audit server, configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Event Log Service -> System -> "Specify the maximum log size (KB)" to at minimum "Enabled:32768".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-SV-000100
- Vuln IDs
-
- V-26600
- Rule IDs
-
- SV-52236r2_rule
Checks: C-46974r1_chk
Verify the Fax (fax) service is not installed or is disabled. Run "Services.msc". If the following is installed and not disabled, this is a finding: Fax (fax)
Fix: F-45251r1_fix
Remove or disable the Fax (fax) service.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN12-SV-000101
- Vuln IDs
-
- V-26602
- Rule IDs
-
- SV-52237r2_rule
Checks: C-46975r1_chk
Verify the Microsoft FTP (msftpsvc) service is not installed or is disabled. Run "Services.msc". If the following is installed and not disabled, this is a finding: Microsoft FTP Service (msftpsvc)
Fix: F-45252r1_fix
Remove or disable the Microsoft FTP Service (msftpsvc) service.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-SV-000103
- Vuln IDs
-
- V-26604
- Rule IDs
-
- SV-52238r2_rule
Checks: C-46976r1_chk
Verify the Peer Network Identity Manager (p2pimsvc) service is not installed or is disabled. Run "Services.msc". If the following is installed and not disabled, this is a finding: Peer Networking Identity Manager (p2pimsvc)
Fix: F-45253r1_fix
Remove or disable the Peer Networking Identity Manager (p2pimsvc) service.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-SV-000104
- Vuln IDs
-
- V-26605
- Rule IDs
-
- SV-52239r2_rule
Checks: C-46977r1_chk
Verify the Simple TCP/IP (simptcp) service is not installed or is disabled. Run "Services.msc". If the following is installed and not disabled, this is a finding: Simple TCP/IP Services (simptcp)
Fix: F-45254r1_fix
Remove or disable the Simple TCP/IP Services (simptcp) service.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN12-SV-000105
- Vuln IDs
-
- V-26606
- Rule IDs
-
- SV-52240r2_rule
Checks: C-46978r1_chk
Verify the Telnet (tlntsvr) service is not installed or is disabled. Run "Services.msc". If the following is installed and not disabled, this is a finding: Telnet (tlntsvr)
Fix: F-45255r1_fix
Remove or disable the Telnet (tlntsvr) service.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000023
- Vuln IDs
-
- V-28504
- Rule IDs
-
- SV-52962r1_rule
Checks: C-47268r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\DeviceInstall\Settings\ Value Name: DisableSendRequestAdditionalSoftwareToWER Type: REG_DWORD Value: 1
Fix: F-45888r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Device Installation -> "Prevent Windows from sending an error report when a device driver requests additional software during installation" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN12-PK-000001
- Vuln IDs
-
- V-32272
- Rule IDs
-
- SV-52961r3_rule
Checks: C-49221r1_chk
Verify the DoD Root CA 2 certificate is installed as a Trusted Root Certification Authority using the Certificates MMC snap-in: Run "MMC". Select "File", "Add/Remove Snap-in". Select "Certificates", click "Add". Select "Computer account", click "Next". Select "Local computer: (the computer this console is running on)", click "Finish". Click "OK". Expand "Certificates" and navigate to "Trusted Root Certification Authorities\Certificates". Search for "DoD Root CA 2" under "Issued To" in the center pane. If there is no entry for "DoD Root CA 2", this is a finding. Select DoD Root CA 2. Right click and select "Open". Select the "Details" Tab. Scroll to the bottom and select "Thumbprint Algorithm". Verify the Value is "sha1". If the value for "Thumbprint Algorithm" is not "sha1", this is a finding. Next select "Thumbprint". If the value for the "Thumbprint" field is not "8C:94:1B:34:EA:1E:A6:ED:9A:E2:BC:54:CF:68:72:52:B4:C9:B5:61", this is a finding. The thumbprint referenced applies to NIPRNet, see PKE documentation for other networks.
Fix: F-45887r1_fix
Install the DoD Root CA 2 certificate. The InstallRoot tool is available on IASE at http://iase.disa.mil/pki-pke/function_pages/tools.html.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN12-PK-000003
- Vuln IDs
-
- V-32274
- Rule IDs
-
- SV-52957r3_rule
Checks: C-49171r1_chk
Verify the DoD Root CA 2 certificate issued by DoD Interoperability Root CA 1 is installed on NIPRNet systems as an Untrusted Certificate using the Certificates MMC snap-in: Run "MMC". Select "File", "Add/Remove Snap-in". Select "Certificates", click "Add". Select "Computer account", click "Next". Select "Local computer: (the computer this console is running on)", click "Finish". Click "OK". Expand "Certificates" and navigate to "Untrusted Certificates\Certificates". Search in the center pane for "DoD Root CA 2" under "Issued To" with "DoD Interoperability Root CA 1" as "Issued By". If there is no entry for this certificate, this is a finding. Select the certificate. Right click and select "Open". Select the "Details" Tab. Scroll to the bottom and select "Thumbprint Algorithm". Verify the Value is "sha1". If the value for "Thumbprint Algorithm" is not "sha1", this is a finding. Next select "Thumbprint". If the value for the "Thumbprint" field is not "99:c4:94:ec:e4:fc:09:3e:ee:13:c4:d6:5b:1b:1e:01:b9:b5:d4:34", this is a finding.
Fix: F-48597r1_fix
Install the DoD Interoperability Root CA 1 to DoD Root CA 2 cross-certificate on NIPRNet systems only. Administrators should run the Federal Bridge Certification Authority (FBCA) Cross-Certificate Removal Tool once as an administrator and once as the current user. The FBCA Cross-Certificate Remover tool and user guide is available on IASE at http://iase.disa.mil/pki-pke/function_pages/tools.html.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN12-RG-000002
- Vuln IDs
-
- V-32282
- Rule IDs
-
- SV-52956r2_rule
Checks: C-47262r1_chk
Navigate to the following registry key and review the assigned permissions: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components On 64-bit systems, also review the permissions assigned to the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components Verify standard user accounts and groups only have Read permissions to this registry key. If any standard user accounts or groups have greater permissions, this is a finding. The default permissions satisfy this requirement.
Fix: F-45882r1_fix
Ensure only Read permissions are assigned to standard user accounts and groups for the following registry keys. The default configuration satisfies this requirement. All systems: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components 64-bit systems: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components
- RMF Control
- CM-11
- Severity
- H
- CCI
- CCI-001812
- Version
- WN12-CC-000116
- Vuln IDs
-
- V-34974
- Rule IDs
-
- SV-52954r1_rule
Checks: C-47260r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Installer\ Value Name: AlwaysInstallElevated Type: REG_DWORD Value: 0
Fix: F-45880r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Installer -> "Always install with elevated privileges" to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN12-RG-000003-MS
- Vuln IDs
-
- V-36439
- Rule IDs
-
- SV-51590r2_rule
Checks: C-46849r2_chk
If the system is not a member of a domain, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Value Name: LocalAccountTokenFilterPolicy Type: REG_DWORD Value: 0 This setting may cause issues with some network scanning tools if local administrative accounts are used remotely. Scans should use domain accounts where possible. If a local administrative account must be used, temporarily enabling the privileged token by configuring the registry value to 1 may be required.
Fix: F-44715r2_fix
Configure the following registry value: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Value Name: LocalAccountTokenFilterPolicy Type: REG_DWORD Value: 0
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-00-000008
- Vuln IDs
-
- V-36451
- Rule IDs
-
- SV-51578r1_rule
Checks: C-46841r2_chk
Determine whether site policy prohibits the use of applications that access the Internet, such as web browsers, or with potential Internet sources, such as email, by administrative accounts, except as necessary for local service administration. If it does not, this is a finding.
Fix: F-44707r2_fix
Establish a site policy to prohibit the use of applications that access the Internet, such as web browsers, or with potential Internet sources, such as email, by administrative accounts. Ensure the policy is enforced.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- WN12-UC-000001
- Vuln IDs
-
- V-36656
- Rule IDs
-
- SV-51758r2_rule
Checks: C-46887r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Policies\Microsoft\Windows\Control Panel\Desktop\ Value Name: ScreenSaveActive Type: REG_SZ Value: 1 Applications requiring continuous, real-time screen display (e.g., network management products) require the following and must be documented with the ISSO: -The logon session does not have administrator rights. -The display station (e.g., keyboard, monitor, etc.) is located in a controlled access area.
Fix: F-44833r2_fix
Configure the policy value for User Configuration -> Administrative Templates -> Control Panel -> Personalization -> "Enable screen saver" to "Enabled".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- WN12-UC-000003
- Vuln IDs
-
- V-36657
- Rule IDs
-
- SV-51760r1_rule
Checks: C-46889r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Policies\Microsoft\Windows\Control Panel\Desktop\ Value Name: ScreenSaverIsSecure Type: REG_SZ Value: 1
Fix: F-44835r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> Control Panel -> Personalization -> "Password protect the screen saver" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-00-000004
- Vuln IDs
-
- V-36658
- Rule IDs
-
- SV-51575r2_rule
Checks: C-46838r2_chk
Review the necessary documentation that identifies the members of the Administrators group. If a list of all users belonging to the Administrators group is not maintained with the ISSO, this is a finding.
Fix: F-44704r1_fix
Create the necessary documentation that identifies the members of the Administrators group.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-00-000005
- Vuln IDs
-
- V-36659
- Rule IDs
-
- SV-51576r1_rule
Checks: C-46839r2_chk
Verify each user with administrative privileges has been assigned a unique administrative account separate from their standard user account. If users with administrative privileges do not have separate accounts for administrative functions and standard user functions, this is a finding.
Fix: F-44705r1_fix
Ensure each user with administrative privileges has a separate account for user duties and one for privileged duties.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- WN12-00-000010
- Vuln IDs
-
- V-36661
- Rule IDs
-
- SV-51579r1_rule
Checks: C-46842r2_chk
Verify the site has a policy to ensure passwords for manually managed application/service accounts are at least 15 characters in length. If such a policy does not exist or has not been implemented, this is a finding.
Fix: F-44708r2_fix
Establish a site policy that requires application/service account passwords that are manually managed to be at least 15 characters in length. Ensure the policy is enforced.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-00-000011
- Vuln IDs
-
- V-36662
- Rule IDs
-
- SV-51580r2_rule
Checks: C-46843r2_chk
Determine if any system administrators with knowledge of application account passwords have left the organization within the last year. Run the DUMPSEC utility. Select "Dump Users as Table" from the "Report" menu. Select the following fields, and click "Add" for each entry: UserName SID PwsdLastSetTime If any application accounts listed that are manually managed and have a date older than one year in the "PwsdLastSetTime" column, this is a finding. If any system administrators with knowledge of application account passwords have left the organization within the last year and the "PwsdLastSetTime" field reflects that application account passwords were not changed at that time, this is a finding.
Fix: F-44709r2_fix
Change application/service account passwords that are manually managed and entered by a system administrator at least annually or whenever an administrator with knowledge of the password leaves the organization.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-00-000002-01
- Vuln IDs
-
- V-36663
- Rule IDs
-
- SV-51573r2_rule
Checks: C-46836r4_chk
Verify a supervisor or administrator password is set in the BIOS or system controller. If a password is not configured, this is a finding. If access is restricted by way of hypervisor configuration settings on virtual systems, this would not be a finding.
Fix: F-44702r4_fix
Access the system's BIOS or system controller. Configure a supervisor/administrator password. Restrictions may also be applied through hypervisor configuration settings for virtual machines.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-00-000003
- Vuln IDs
-
- V-36664
- Rule IDs
-
- SV-51574r3_rule
Checks: C-46837r3_chk
Verify whether the system BIOS or controller allows removable media for the boot loader. If it does, this is a finding. If access is restricted by way of hypervisor configuration settings on virtual systems, this would not be a finding.
Fix: F-44703r2_fix
Configure the system to use a boot loader installed on fixed media. Restrictions may also be applied through hypervisor configuration settings for virtual machines.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-00-000006
- Vuln IDs
-
- V-36666
- Rule IDs
-
- SV-51577r1_rule
Checks: C-46840r2_chk
Determine whether the site has a policy that requires SAs be trained for all operating systems running on systems under their control. If the site does not have a policy requiring SAs be trained for all operating systems under their control, this is a finding.
Fix: F-44706r1_fix
Establish site policy that requires SAs be trained for all operating systems running on systems under their control.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000082
- Vuln IDs
-
- V-36667
- Rule IDs
-
- SV-51604r1_rule
Checks: C-46854r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*" Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Object Access -> Removable Storage - Failure
Fix: F-44725r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Object Access -> "Audit Removable Storage" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000081
- Vuln IDs
-
- V-36668
- Rule IDs
-
- SV-51601r1_rule
Checks: C-46853r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*" Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Object Access -> Removable Storage - Success
Fix: F-44723r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Object Access -> "Audit Removable Storage" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000074
- Vuln IDs
-
- V-36669
- Rule IDs
-
- SV-51599r1_rule
Checks: C-46852r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Object Access -> Handle Manipulation - Failure
Fix: F-44720r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Object Access -> "Audit Handle Manipulation" with "Failure" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-AU-000200
- Vuln IDs
-
- V-36670
- Rule IDs
-
- SV-51561r1_rule
Checks: C-46830r2_chk
Determine whether audit logs are reviewed on a predetermined schedule. If audit logs are not reviewed on a regular basis, this is a finding.
Fix: F-44692r2_fix
Review audit logs on a predetermined scheduled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-AU-000201
- Vuln IDs
-
- V-36671
- Rule IDs
-
- SV-51563r1_rule
Checks: C-46831r2_chk
Determine whether audit data is retained for at least one year. If the audit data is not retained for at least a year, this is a finding.
Fix: F-44693r2_fix
Ensure the audit data is retained for at least a year.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- WN12-AU-000203-01
- Vuln IDs
-
- V-36672
- Rule IDs
-
- SV-51566r2_rule
Checks: C-58509r2_chk
Determine if a process to back up log data to a different system or media than the system being audited has been implemented. If it has not, this is a finding.
Fix: F-62923r1_fix
Establish and implement a process for backing up log data to another system or media other than the system being audited.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000011
- Vuln IDs
-
- V-36673
- Rule IDs
-
- SV-51605r1_rule
Checks: C-46855r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Tcpip\Parameters\ Value Name: EnableIPAutoConfigurationLimits Type: REG_DWORD Value: 1
Fix: F-44726r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> TCPIP Settings -> Parameters -> "Set IP Stateless Autoconfiguration Limits State" to "Enabled".
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- WN12-CC-000018
- Vuln IDs
-
- V-36677
- Rule IDs
-
- SV-51606r1_rule
Checks: C-46856r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\Servicing\ Value Name: UseWindowsUpdate Type: REG_DWORD Value: 2
Fix: F-44727r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> "Specify settings for optional component installation and component repair" to "Enabled" and with "Never attempt to download payload from Windows Update" selected.
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- WN12-CC-000025
- Vuln IDs
-
- V-36678
- Rule IDs
-
- SV-51607r1_rule
Checks: C-46858r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\DriverSearching\ Value Name: DriverServerSelection Type: REG_DWORD Value: 1
Fix: F-44728r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Device Installation -> "Specify the search server for device driver updates" to "Enabled" with "Search Managed Server" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000027
- Vuln IDs
-
- V-36679
- Rule IDs
-
- SV-51608r1_rule
Checks: C-46859r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Policies\EarlyLaunch\ Value Name: DriverLoadPolicy Type: REG_DWORD Value: 1
Fix: F-44729r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Early Launch Antimalware -> "Boot-Start Driver Initialization Policy" to "Enabled" with "Good and Unknown" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000030
- Vuln IDs
-
- V-36680
- Rule IDs
-
- SV-51609r1_rule
Checks: C-46860r2_chk
The Windows Store is not installed by default. If the \Windows\WindowsStore directory does not exist, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Explorer\ Value Name: NoUseStoreOpenWith Type: REG_DWORD Value: 1
Fix: F-44730r2_fix
If the \Windows\WindowsStore directory exists, configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings -> "Turn off access to the Store" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000048
- Vuln IDs
-
- V-36681
- Rule IDs
-
- SV-51610r1_rule
Checks: C-46861r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Control Panel\International\ Value Name: BlockUserInputMethodsForSignIn Type: REG_DWORD Value: 1
Fix: F-44731r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Locale Services -> "Disallow copying of user input methods to the system account for sign-in" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000051
- Vuln IDs
-
- V-36684
- Rule IDs
-
- SV-51611r1_rule
Checks: C-46862r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\System\ Value Name: EnumerateLocalUsers Type: REG_DWORD Value: 0
Fix: F-44732r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Logon -> "Enumerate local users on domain-joined computers" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000052
- Vuln IDs
-
- V-36687
- Rule IDs
-
- SV-51612r1_rule
Checks: C-46863r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\System\ Value Name: DisableLockScreenAppNotifications Type: REG_DWORD Value: 1
Fix: F-44733r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Logon -> "Turn off app notifications on the lock screen" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000056
- Vuln IDs
-
- V-36690
- Rule IDs
-
- SV-51735r1_rule
Checks: C-46864r2_chk
If an organization has a documented operational requirement to keep displays active, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Power\PowerSettings\3C0BC021-C8A8-4E07-A973-6B14CBCB2B7E\ Value Name: DCSettingIndex Type: REG_DWORD Value: 0x000004b0 (1200) or less
Fix: F-44810r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Power Management -> Video and Display Settings -> "Turn off the display (on battery)" to "Enabled" with "1200" seconds or less.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000057
- Vuln IDs
-
- V-36691
- Rule IDs
-
- SV-51736r1_rule
Checks: C-46865r2_chk
If an organization has a documented operational requirement to keep displays active, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Power\PowerSettings\3C0BC021-C8A8-4E07-A973-6B14CBCB2B7E\ Value Name: ACSettingIndex Type: REG_DWORD Value: 0x000004b0 (1200) or less
Fix: F-44811r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Power Management -> Video and Display Settings -> "Turn off the display (plugged in)" to "Enabled" with "1200" seconds or less.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000065
- Vuln IDs
-
- V-36696
- Rule IDs
-
- SV-51737r2_rule
Checks: C-46866r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\AppCompat\ Value Name: DisablePcaUI Type: REG_DWORD Value: 0
Fix: F-44812r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Troubleshooting and Diagnostics -> Application Compatibility Diagnostics -> "Detect compatibility issues for applications and drivers" to "Disabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000070
- Vuln IDs
-
- V-36697
- Rule IDs
-
- SV-51738r1_rule
Checks: C-46867r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Appx\ Value Name: AllowAllTrustedApps Type: REG_DWORD Value: 1
Fix: F-44813r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> App Package Deployment -> "Allow all trusted apps to install" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000075
- Vuln IDs
-
- V-36698
- Rule IDs
-
- SV-51739r1_rule
Checks: C-46868r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Biometrics\ Value Name: Enabled Type: REG_DWORD Value: 0
Fix: F-44814r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Biometrics -> "Allow the use of biometrics" to "Disabled".
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- WN12-CC-000076
- Vuln IDs
-
- V-36700
- Rule IDs
-
- SV-51740r1_rule
Checks: C-46869r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\CredUI\ Value Name: DisablePasswordReveal Type: REG_DWORD Value: 1
Fix: F-44815r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Credential User Interface -> "Do not display the password reveal button" to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-CC-000088
- Vuln IDs
-
- V-36707
- Rule IDs
-
- SV-51747r2_rule
Checks: C-46876r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\System\ Value Name: EnableSmartScreen Type: REG_DWORD Value: 0
Fix: F-44822r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> File Explorer -> "Configure Windows SmartScreen" to "Enabled" with "Turn off SmartScreen" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000095
- Vuln IDs
-
- V-36708
- Rule IDs
-
- SV-51748r2_rule
Checks: C-46877r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\LocationAndSensors\ Value Name: DisableLocation Type: REG_DWORD Value: 1 (Enabled) If location services are approved for the system by the organization, this may be set to "Disabled" (0). This must be documented with the ISSO.
Fix: F-44823r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Location and Sensors -> "Turn off location" to "Enabled". If location services are approved by the organization for a device, this must be documented.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000106
- Vuln IDs
-
- V-36709
- Rule IDs
-
- SV-51749r1_rule
Checks: C-46878r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Internet Explorer\Feeds\ Value Name: AllowBasicAuthInClear Type: REG_DWORD Value: 0
Fix: F-44824r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> RSS Feeds -> "Turn on Basic feed authentication over HTTP" to "Disabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000109
- Vuln IDs
-
- V-36710
- Rule IDs
-
- SV-51750r2_rule
Checks: C-58003r1_chk
The Windows Store is not installed by default. If the \Windows\WinStore directory does not exist, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Windows 2012 R2: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsStore\ Value Name: AutoDownload Type: REG_DWORD Value: 0x00000002 (2) Windows 2012: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsStore\WindowsUpdate\ Value Name: AutoDownload Type: REG_DWORD Value: 0x00000002 (2)
Fix: F-62329r2_fix
The Windows Store is not installed by default. If the \Windows\WinStore directory does not exist, this is NA. Windows 2012 R2: Windows 2012 R2 split the original policy that configures this setting into two separate ones. Configuring either one to "Enabled" will update the registry value as identified in the Check section. Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Store -> "Turn off Automatic Download of updates on Win8 machines" or "Turn off Automatic Download and install of updates" to "Enabled". Windows 2012: Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Store -> "Turn off Automatic Download of updates" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000110
- Vuln IDs
-
- V-36711
- Rule IDs
-
- SV-51751r2_rule
Checks: C-58005r1_chk
The Windows Store is not installed by default. If the \Windows\WinStore directory does not exist, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsStore\ Value Name: RemoveWindowsStore Type: REG_DWORD Value: 1
Fix: F-62333r1_fix
The Windows Store is not installed by default. If the \Windows\WinStore directory does not exist, this is NA. Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Store -> "Turn off the Store application" to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN12-CC-000123
- Vuln IDs
-
- V-36712
- Rule IDs
-
- SV-51752r1_rule
Checks: C-46881r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\WinRM\Client\ Value Name: AllowBasic Type: REG_DWORD Value: 0
Fix: F-44827r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Remote Management (WinRM) -> WinRM Client -> "Allow Basic authentication" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN12-CC-000124
- Vuln IDs
-
- V-36713
- Rule IDs
-
- SV-51753r2_rule
Checks: C-46882r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\WinRM\Client\ Value Name: AllowUnencryptedTraffic Type: REG_DWORD Value: 0
Fix: F-44828r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Remote Management (WinRM) -> WinRM Client -> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- WN12-CC-000125
- Vuln IDs
-
- V-36714
- Rule IDs
-
- SV-51754r1_rule
Checks: C-46883r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\WinRM\Client\ Value Name: AllowDigest Type: REG_DWORD Value: 0
Fix: F-44829r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Remote Management (WinRM) -> WinRM Client -> "Disallow Digest authentication" to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN12-CC-000126
- Vuln IDs
-
- V-36718
- Rule IDs
-
- SV-51755r2_rule
Checks: C-46884r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\WinRM\Service\ Value Name: AllowBasic Type: REG_DWORD Value: 0
Fix: F-44830r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Remote Management (WinRM) -> WinRM Service -> "Allow Basic authentication" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN12-CC-000127
- Vuln IDs
-
- V-36719
- Rule IDs
-
- SV-51756r2_rule
Checks: C-46885r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\WinRM\Service\ Value Name: AllowUnencryptedTraffic Type: REG_DWORD Value: 0
Fix: F-44831r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Remote Management (WinRM) -> WinRM Service -> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN12-CC-000128
- Vuln IDs
-
- V-36720
- Rule IDs
-
- SV-51757r1_rule
Checks: C-46886r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\WinRM\Service\ Value Name: DisableRunAs Type: REG_DWORD Value: 1
Fix: F-44832r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Remote Management (WinRM) -> WinRM Service -> "Disallow WinRM from storing RunAs credentials" to "Enabled".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN12-AU-000204
- Vuln IDs
-
- V-36722
- Rule IDs
-
- SV-51569r1_rule
Checks: C-46833r1_chk
Verify the permissions on the Application event log (Application.evtx). Standard user accounts or groups must not have greater than Read access. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\SYSTEM32\WINEVT\LOGS" directory. They may have been moved to another folder. If the permissions for these files are not as restrictive as the ACLs listed, this is a finding.
Fix: F-44699r1_fix
Ensure the permissions on the Application event log (Application.evtx) are configured to prevent standard user accounts or groups from having greater than Read access. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\SYSTEM32\WINEVT\LOGS" directory. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN12-AU-000205
- Vuln IDs
-
- V-36723
- Rule IDs
-
- SV-51571r1_rule
Checks: C-46834r1_chk
Verify the permissions on the Security event log (Security.evtx). Standard user accounts or groups must not have access. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\SYSTEM32\WINEVT\LOGS" directory. They may have been moved to another folder. If the permissions for these files are not as restrictive as the ACLs listed, this is a finding.
Fix: F-44700r2_fix
Ensure the permissions on the Security event log (Security.evtx) are configured to prevent standard user accounts or groups from having access. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\SYSTEM32\WINEVT\LOGS" directory. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN12-AU-000206
- Vuln IDs
-
- V-36724
- Rule IDs
-
- SV-51572r1_rule
Checks: C-46835r1_chk
Verify the permissions on the System event log (System.evtx). Standard user accounts or groups must not have greater than Read access. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\SYSTEM32\WINEVT\LOGS" directory. They may have been moved to another folder. If the permissions for these files are not as restrictive as the ACLs listed, this is a finding.
Fix: F-44701r1_fix
Ensure the permissions on the System event log (System.evtx) are configured to prevent standard user accounts or groups from having greater than Read access. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\SYSTEM32\WINEVT\LOGS" directory. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-00-000015
- Vuln IDs
-
- V-36733
- Rule IDs
-
- SV-51581r2_rule
Checks: C-58959r1_chk
Determine whether user-level information is backed up in accordance with local recovery time and recovery point objectives. If user-level information is not backed up in accordance with local recovery time and recovery point objectives, this is a finding.
Fix: F-63423r2_fix
Implement user-level information backups in accordance with local recovery time and recovery point objectives.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-001233
- Version
- WN12-GE-000023
- Vuln IDs
-
- V-36734
- Rule IDs
-
- SV-51582r2_rule
Checks: C-58961r1_chk
Verify the operating system employs automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP). If it does not, this is a finding.
Fix: F-63425r1_fix
Configure the operating system to employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-GE-000024
- Vuln IDs
-
- V-36735
- Rule IDs
-
- SV-51583r2_rule
Checks: C-46846r1_chk
Verify the organization has an automated process to install security-related software updates. If it does not, this is a finding.
Fix: F-44712r1_fix
Establish a process to automatically install security-related software updates.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-GE-000025
- Vuln IDs
-
- V-36736
- Rule IDs
-
- SV-51584r1_rule
Checks: C-46847r1_chk
Verify the system has software installed and running that provides certificate validation and revocation checking. If it does not, this is a finding.
Fix: F-44713r1_fix
Install software that provides certificate validation and revocation checking.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SO-000020
- Vuln IDs
-
- V-36772
- Rule IDs
-
- SV-51594r1_rule
Checks: C-46850r1_chk
Verify whether BitLocker is enabled for the OS volumes in "BitLocker Drive Encryption" in Control Panel. If BitLocker is not enabled, this is NA. If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: MaxDevicePasswordFailedAttempts Value Type: REG_DWORD Value: 0x0000000a (10)
Fix: F-44716r1_fix
If BitLocker is enabled for the OS volumes, configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Interactive logon: Machine account lockout threshold" to "10" invalid logon attempts.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- WN12-SO-000021
- Vuln IDs
-
- V-36773
- Rule IDs
-
- SV-51596r1_rule
Checks: C-46851r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: InactivityTimeoutSecs Value Type: REG_DWORD Value: 0x00000384 (900) (or less)
Fix: F-44717r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Interactive logon: Machine inactivity limit" to "900" seconds" or less.
- RMF Control
- AC-11
- Severity
- L
- CCI
- CCI-000060
- Version
- WN12-UC-000002
- Vuln IDs
-
- V-36774
- Rule IDs
-
- SV-51759r1_rule
Checks: C-46888r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Policies\Microsoft\Windows\Control Panel\Desktop\ Value Name: SCRNSAVE.EXE Type: REG_SZ Value: scrnsave.scr
Fix: F-44834r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> Control Panel -> Personalization -> "Force specific screen saver" to "Enabled" with "scrnsave.scr" specified as the screen saver executable name.
- RMF Control
- AC-11
- Severity
- L
- CCI
- CCI-000060
- Version
- WN12-UC-000004
- Vuln IDs
-
- V-36775
- Rule IDs
-
- SV-51761r1_rule
Checks: C-46890r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: NoDispScrSavPage Type: REG_DWORD Value: 1
Fix: F-44836r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> Control Panel -> Personalization -> "Prevent changing screen saver" to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-UC-000005
- Vuln IDs
-
- V-36776
- Rule IDs
-
- SV-51762r1_rule
Checks: C-46891r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\PushNotifications\ Value Name: NoCloudApplicationNotification Type: REG_DWORD Value: 1
Fix: F-44837r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> Start Menu and Taskbar -> Notifications -> "Turn off notifications network usage" to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN12-UC-000006
- Vuln IDs
-
- V-36777
- Rule IDs
-
- SV-51763r1_rule
Checks: C-46892r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_CURRENT_USER Registry Path: \SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\PushNotifications\ Value Name: NoToastApplicationNotificationOnLockScreen Type: REG_DWORD Value: 1
Fix: F-44838r1_fix
Configure the policy value for User Configuration -> Administrative Templates -> Start Menu and Taskbar -> Notifications -> "Turn off toast notifications on the lock screen" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-AU-000202
- Vuln IDs
-
- V-40166
- Rule IDs
-
- SV-52124r2_rule
Checks: C-46942r2_chk
If audit data does not contain SAMI data, this is NA. Determine whether audit data containing SAMI data is retained for at least five years. If audit data containing SAMI data is not retained for at least five years, this is a finding.
Fix: F-45149r2_fix
If audit data contains SAMI data, ensure it is retained for at least five years.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-00-000016
- Vuln IDs
-
- V-40172
- Rule IDs
-
- SV-52130r2_rule
Checks: C-46943r1_chk
Determine if system-level information backups are protected from destruction and stored in a physically secure location. If they are not, this is a finding.
Fix: F-45156r1_fix
Ensure system-level information backups are stored in a secure location and protected from destruction.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-00-000017
- Vuln IDs
-
- V-40173
- Rule IDs
-
- SV-52131r3_rule
Checks: C-58963r1_chk
Determine whether system-related documentation is backed up in accordance with local recovery time and recovery point objectives. If system-related documentation is not backed up in accordance with local recovery time and recovery point objectives, this is a finding.
Fix: F-63427r1_fix
Back up system-related documentation in accordance with local recovery time and recovery point objectives.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN12-GE-000003
- Vuln IDs
-
- V-40175
- Rule IDs
-
- SV-52133r2_rule
Checks: C-46945r1_chk
If V-19910 from an antivirus STIG has been applied to the system, this is NA. Verify the signature file for the virus scan program is up to date. If the antivirus program signature file is not dated within the past 7 days, this is a finding. The version numbers and the date of the signature file can generally be checked by starting the antivirus program. The information may appear in the antivirus window or be available in the Help > About window. The location varies from product to product.
Fix: F-45159r1_fix
Configure the antivirus program to update the signature file at least every 7 days. More frequent (daily) updates are recommended.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- WN12-GE-000007
- Vuln IDs
-
- V-40177
- Rule IDs
-
- SV-52135r3_rule
Checks: C-46946r2_chk
The default permissions are adequate when the Security Option "Network access: Let everyone permissions apply to anonymous users" is set to "Disabled" (V-3377). If the default ACLs are maintained and the referenced option is set to "Disabled", this is not a finding. Verify the default permissions for the program file directories (Program Files and Program Files (x86)). Nonprivileged groups such as Users or Authenticated Users must not have greater than Read & execute permissions except where noted as defaults. (Individual accounts must not be used to assign permissions.) Viewing in File Explorer: For each folder, view the Properties. Select the "Security" tab, and the "Advanced" button. Default Permissions: \Program Files and \Program Files (x86) Type - "Allow" for all Inherited from - "None" for all Principal - Access - Applies to TrustedInstaller - Full control - This folder and subfolders SYSTEM - Modify - This folder only SYSTEM - Full control - Subfolders and files only Administrators - Modify - This folder only Administrators - Full control - Subfolders and files only Users - Read & execute - This folder, subfolders and files CREATOR OWNER - Full control - Subfolders and files only ALL APPLICATION PACKAGES - Read & execute - This folder, subfolders and files Alternately, use Icacls: Open a Command prompt (admin). Enter icacls followed by the directory: icacls "c:\program files" icacls "c:\program files (x86)" The following results should be displayed as each is entered: c:\program files NT SERVICE\TrustedInstaller:(F) NT SERVICE\TrustedInstaller:(CI)(IO)(F) NT AUTHORITY\SYSTEM:(M) NT AUTHORITY\SYSTEM:(OI)(CI)(IO)(F) BUILTIN\Administrators:(M) BUILTIN\Administrators:(OI)(CI)(IO)(F) BUILTIN\Users:(RX) BUILTIN\Users:(OI)(CI)(IO)(GR,GE) CREATOR OWNER:(OI)(CI)(IO)(F) APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(RX) APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(OI)(CI)(IO)(GR,GE) Successfully processed 1 files; Failed processing 0 files
Fix: F-45161r1_fix
Maintain the default permissions for the program file directories and configure the Security Option: "Network access: Let everyone permissions apply to anonymous users" to "Disabled" (V-3377). Default Permissions: \Program Files and \Program Files (x86) Type - "Allow" for all Inherited from - "None" for all Principal - Access - Applies to TrustedInstaller - Full control - This folder and subfolders SYSTEM - Modify - This folder only SYSTEM - Full control - Subfolders and files only Administrators - Modify - This folder only Administrators - Full control - Subfolders and files only Users - Read & execute - This folder, subfolders and files CREATOR OWNER - Full control - Subfolders and files only ALL APPLICATION PACKAGES - Read & execute - This folder, subfolders and files
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- WN12-GE-000006
- Vuln IDs
-
- V-40178
- Rule IDs
-
- SV-52136r3_rule
Checks: C-46947r2_chk
The default permissions are adequate when the Security Option "Network access: Let everyone permissions apply to anonymous users" is set to "Disabled" (V-3377). If the default ACLs are maintained and the referenced option is set to "Disabled", this is not a finding. Verify the default permissions for the system drive's root directory (usually C:\). Nonprivileged groups such as Users or Authenticated Users must not have greater than Read & execute permissions except where noted as defaults. (Individual accounts must not be used to assign permissions.) Viewing in File Explorer: View the Properties of system drive root directory. Select the "Security" tab, and the "Advanced" button. C:\ Type - "Allow" for all Inherited from - "None" for all Principal - Access - Applies to SYSTEM - Full control - This folder, subfolders and files Administrators - Full control - This folder, subfolders and files Users - Read & execute - This folder, subfolders and files Users - Create folders / append data - This folder and subfolders Users - Create files / write data - Subfolders only CREATOR OWNER - Full Control - Subfolders and files only Alternately, use Icacls: Open a Command prompt (admin). Enter icacls followed by the directory: icacls c:\ The following results should be displayed: c:\ NT AUTHORITY\SYSTEM:(OI)(CI)(F) BUILTIN\Administrators:(OI)(CI)(F) BUILTIN\Users:(OI)(CI)(RX) BUILTIN\Users:(CI)(AD) BUILTIN\Users:(CI)(IO)(WD) CREATOR OWNER:(OI)(CI)(IO)(F) Successfully processed 1 files; Failed processing 0 files
Fix: F-45162r1_fix
Maintain the default permissions for the system drive's root directory and configure the Security Option: "Network access: Let everyone permissions apply to anonymous users" to "Disabled" (V-3377). Default Permissions C:\ Type - "Allow" for all Inherited from - "None" for all Principal - Access - Applies to SYSTEM - Full control - This folder, subfolders and files Administrators - Full control - This folder, subfolders and files Users - Read & execute - This folder, subfolders and files Users - Create folders / append data - This folder and subfolders Users - Create files / write data - Subfolders only CREATOR OWNER - Full Control - Subfolders and files only
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- WN12-GE-000008
- Vuln IDs
-
- V-40179
- Rule IDs
-
- SV-52137r3_rule
Checks: C-46948r2_chk
The default permissions are adequate when the Security Option "Network access: Let everyone permissions apply to anonymous users" is set to "Disabled" (V-3377). If the default ACLs are maintained and the referenced option is set to "Disabled", this is not a finding. Verify the default permissions for the Windows installation directory (usually C:\Windows). Nonprivileged groups such as Users or Authenticated Users must not have greater than Read & execute permissions except where noted as defaults. (Individual accounts must not be used to assign permissions.) Viewing in File Explorer: View the Properties of the folder. Select the "Security" tab, and the "Advanced" button. Default Permissions: \Windows Type - "Allow" for all Inherited from - "None" for all Principal - Access - Applies to TrustedInstaller - Full control - This folder and subfolders SYSTEM - Modify - This folder only SYSTEM - Full control - Subfolders and files only Administrators - Modify - This folder only Administrators - Full control - Subfolders and files only Users - Read & execute - This folder, subfolders and files CREATOR OWNER - Full control - Subfolders and files only ALL APPLICATION PACKAGES - Read & execute - This folder, subfolders and files Alternately, use Icacls: Open a Command prompt (admin). Enter icacls followed by the directory: icacls c:\windows The following results should be displayed: c:\windows NT SERVICE\TrustedInstaller:(F) NT SERVICE\TrustedInstaller:(CI)(IO)(F) NT AUTHORITY\SYSTEM:(M) NT AUTHORITY\SYSTEM:(OI)(CI)(IO)(F) BUILTIN\Administrators:(M) BUILTIN\Administrators:(OI)(CI)(IO)(F) BUILTIN\Users:(RX) BUILTIN\Users:(OI)(CI)(IO)(GR,GE) CREATOR OWNER:(OI)(CI)(IO)(F) APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(RX) APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(OI)(CI)(IO)(GR,GE) Successfully processed 1 files; Failed processing 0 files
Fix: F-45163r1_fix
Maintain the default file ACLs and configure the Security Option: "Network access: Let everyone permissions apply to anonymous users" to "Disabled" (V-3377). Default Permissions: Type - "Allow" for all Inherited from - "None" for all Principal - Access - Applies to TrustedInstaller - Full control - This folder and subfolders SYSTEM - Modify - This folder only SYSTEM - Full control - Subfolders and files only Administrators - Modify - This folder only Administrators - Full control - Subfolders and files only Users - Read & execute - This folder, subfolders and files CREATOR OWNER - Full control - Subfolders and files only ALL APPLICATION PACKAGES - Read & execute - This folder, subfolders and files
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-GE-000011
- Vuln IDs
-
- V-40193
- Rule IDs
-
- SV-52151r2_rule
Checks: C-46949r1_chk
If no virtual guest operating systems exist, this is NA. Determine if virtual guest operating systems have been registered in a vulnerability and asset management system as separate assets. If they have not, this is a finding.
Fix: F-45176r1_fix
Register all virtual guest operating systems as separate assets in a vulnerability and asset management system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-00-000002-02
- Vuln IDs
-
- V-40195
- Rule IDs
-
- SV-52153r2_rule
Checks: C-46950r2_chk
If the BIOS or system controller does not support user-level access in addition to supervisor/administrator access, this is NA. If the BIOS or system controller supports user-level access in addition to supervisor/administrator access, determine whether this access is enabled. If user-level access is enabled, this is a finding. If access is restricted by way of hypervisor configuration settings on virtual systems, this would not be a finding.
Fix: F-45179r2_fix
Access the system's BIOS or system controller. Disable user-level access. Restrictions may also be applied through hypervisor configuration settings for virtual machines.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-00-000009-02
- Vuln IDs
-
- V-40198
- Rule IDs
-
- SV-52157r2_rule
Checks: C-46952r1_chk
If no accounts are members of the Backup Operators group, this is NA. Verify users with accounts in the Backup Operators group have a separate user account for backup functions and for performing normal user tasks. If users with accounts in the Backup Operators group do not have separate accounts for backup functions and standard user functions, this is a finding.
Fix: F-45183r1_fix
Ensure each member of the Backup Operators group has separate accounts for backup functions and standard user functions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000060
- Vuln IDs
-
- V-40200
- Rule IDs
-
- SV-52159r3_rule
Checks: C-46953r2_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Object Access -> Central Policy Staging - Failure
Fix: F-45185r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Object Access -> "Audit Central Access Policy Staging" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000059
- Vuln IDs
-
- V-40202
- Rule IDs
-
- SV-52161r3_rule
Checks: C-46954r2_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Object Access -> Central Policy Staging - Success
Fix: F-45186r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Object Access -> "Audit Central Access Policy Staging" with "Success" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000136
- Vuln IDs
-
- V-40204
- Rule IDs
-
- SV-52163r2_rule
Checks: C-46955r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: RedirectOnlyDefaultClientPrinter Type: REG_DWORD Value: 1
Fix: F-45188r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Printer Redirection -> "Redirect only the default client printer" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-SV-000106
- Vuln IDs
-
- V-40206
- Rule IDs
-
- SV-52165r2_rule
Checks: C-46956r1_chk
Verify the Smart Card Removal Policy service is configured to "Automatic". Run "Services.msc". If the Startup Type for Smart Card Removal Policy is not set to Automatic, this is a finding.
Fix: F-45191r1_fix
Configure the Startup Type for the Smart Card Removal Policy service to "Automatic".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN12-PK-000004
- Vuln IDs
-
- V-40237
- Rule IDs
-
- SV-52196r3_rule
Checks: C-49208r1_chk
Verify the DoD Root CA 2 certificate issued by US DoD CCEB Interoperability Root CA 1 is installed on NIPRNet systems as an Untrusted Certificate using the Certificates MMC snap-in: Run "MMC". Select "File", "Add/Remove Snap-in". Select "Certificates", click "Add". Select "Computer account", click "Next". Select "Local computer: (the computer this console is running on)", click "Finish". Click "OK". Expand "Certificates" and navigate to "Untrusted Certificates\Certificates". Search in the center pane for "DoD Root CA 2" under "Issued To" with "US DoD CCEB Interoperability Root CA 1" as "Issued By". If there is no entry for this certificate, this is a finding. Select the certificate. Right click and select "Open". Select the "Details" Tab. Scroll to the bottom and select "Thumbprint Algorithm". Verify the Value is "sha1". If the value for "Thumbprint Algorithm" is not "sha1", this is a finding. Next select "Thumbprint". If the value for the "Thumbprint" field is not "7d:a8:e8:42:96:ee:23:88:18:ee:42:72:87:77:45:08:b2:6d:09:4a", this is a finding.
Fix: F-48770r1_fix
Install the US DoD CCEB Interoperability Root CA 1 to DoD Root CA 2 cross-certificate on NIPRNet systems only. Administrators should run the Federal Bridge Certification Authority (FBCA) Cross-Certificate Removal Tool once as an administrator and once as the current user. The FBCA Cross-Certificate Remover tool and user guide is available on IASE at http://iase.disa.mil/pki-pke/function_pages/tools.html.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-FW-000001
- Vuln IDs
-
- V-42420
- Rule IDs
-
- SV-55085r1_rule
Checks: C-48767r2_chk
Determine if a host-based firewall is installed and enabled on the system. If a host-based firewall is not installed and enabled on the system, this is a finding. The configuration requirements will be determined by the applicable firewall STIG.
Fix: F-47956r2_fix
Install and enable a host-based firewall on the system.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000138
- Vuln IDs
-
- V-43238
- Rule IDs
-
- SV-56343r2_rule
Checks: C-49387r1_chk
This requirement is NA for the initial release of Windows 2012. It is applicable to Windows 2012 R2. Verify the registry value below. If it does not exist or is not configured as specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Personalization\ Value Name: NoLockScreenSlideshow Value Type: REG_DWORD Value: 1
Fix: F-49190r1_fix
This requirement is NA for the initial release of Windows 2012. It is applicable to Windows 2012 R2. Configure the policy value for Computer Configuration -> Administrative Templates -> Control Panel -> Personalization -> "Prevent enabling lock screen slide show" to "Enabled".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN12-CC-000139
- Vuln IDs
-
- V-43239
- Rule IDs
-
- SV-56344r2_rule
Checks: C-57999r1_chk
This requirement is NA for the initial release of Windows 2012. It is applicable to Windows 2012 R2. Verify the registry value below. If it does not exist or is not configured as specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit\ Value Name: ProcessCreationIncludeCmdLine_Enabled Value Type: REG_DWORD Value: 0
Fix: F-62325r1_fix
This requirement is NA for the initial release of Windows 2012. It is applicable to Windows 2012 R2. Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Audit Process Creation -> "Include command line in process creation events" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN12-CC-000140
- Vuln IDs
-
- V-43240
- Rule IDs
-
- SV-56346r2_rule
Checks: C-49389r1_chk
This requirement is NA for the initial release of Windows 2012. It is applicable to Windows 2012 R2. Verify the registry value below. If it does not exist or is not configured as specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\System\ Value Name: DontDisplayNetworkSelectionUI Value Type: REG_DWORD Value: 1
Fix: F-49192r2_fix
This requirement is NA for the initial release of Windows 2012. It is applicable to Windows 2012 R2. Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Logon -> "Do not display network selection UI" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-CC-000141
- Vuln IDs
-
- V-43241
- Rule IDs
-
- SV-56353r2_rule
Checks: C-49390r1_chk
This requirement is NA for the initial release of Windows 2012. It is applicable to Windows 2012 R2. Verify the registry value below. If it does not exist or is not configured as specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Value Name: MSAOptional Value Type: REG_DWORD Value: 1
Fix: F-49195r2_fix
This requirement is NA for the initial release of Windows 2012. It is applicable to Windows 2012 R2. Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> App Runtime -> "Allow Microsoft accounts to be optional" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-CC-000145
- Vuln IDs
-
- V-43245
- Rule IDs
-
- SV-56355r2_rule
Checks: C-49391r1_chk
This requirement is NA for the initial release of Windows 2012. It is applicable to Windows 2012 R2. Verify the registry value below. If it does not exist or is not configured as specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: DisableAutomaticRestartSignOn Value Type: REG_DWORD Value: 1
Fix: F-49196r1_fix
This requirement is NA for the initial release of Windows 2012. It is applicable to Windows 2012 R2. Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Logon Options -> "Sign-in last interactive user automatically after a system-initiated restart" to "Disabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN12-GE-000200-MS
- Vuln IDs
-
- V-45589
- Rule IDs
-
- SV-58487r2_rule
Checks: C-58023r2_chk
This requirement is NA for non domain-joined systems. *This requirement may be satisfied by the existence of the new built-in security groups "Local account" or "Local account and member of Administrators group". Execute the following PowerShell commands to determine if the new built-in security groups exist on the system: $SID = New-Object System.Security.Principal.SecurityIdentifier ("S-1-5-113") $Account = $SID.Translate([System.Security.Principal.NTAccount]) $Account.Value If the group exists, "NT Authority\Local account" will be returned. (Using SID S-1-5-114 will return "NT Authority\Local account and member of Administrators group".) If the built-in groups exist, this is not a finding. If the built-in groups do not exist on the system, review local groups defined on the system. Documentation and scripts supporting the creation of this group to restrict local administrative accounts were changed at one point. The original name, "DeniedNetworkAccess", was changed to "DenyNetworkAccess". Automated benchmarks will look for either of these groups. If the group "DenyNetworkAccess" or "DeniedNetworkAccess" does not exist, this is a finding. Compare the membership of the defined group with the local Administrators group. Verify the group includes all local administrator accounts as members. This includes the built-in Administrator account. It does not include domain administrative accounts or groups. If the group "DenyNetworkAccess" or "DeniedNetworkAccess" does not include all local administrator accounts, this is a finding. *Windows 8.1 and Windows Server 2012 R2 added new built-in security groups, "Local account" and "Local account and member of Administrators group", for assigning permissions and rights to local accounts. Microsoft Security Advisory Patch 2871997 adds these groups to Windows 7, Windows 8, Windows Server 2008 R2, and Windows Server 2012. Use these groups instead of creating a group for local administrator accounts to apply to deny rights where required. Assign the group "Local account and member of Administrators group" or the more restrictive "Local account". Automated benchmarks will look for the groups referenced in the requirement. Use of other methods will require manual validation.
Fix: F-62385r3_fix
This requirement is NA for non domain-joined systems. *This requirement is satisfied by the new built-in security groups below for Windows 2012 R2 systems. *Apply the patch to Windows 2012 that creates the new built-in security groups, "Local account" and "Local account and member of Administrators group". Or create the required groups defined below. Documentation and scripts supporting the creation of this group to restrict local administrative accounts were changed at one point. The original name, "DeniedNetworkAccess", was changed to "DenyNetworkAccess". Automated benchmarks will look for either of these groups. Create a local group with the name "DenyNetworkAccess" or "DeniedNetworkAccess". Include all local administrator accounts as members of the group, including the built-in Administrator account. Do not include domain administrative accounts or groups. *Windows 8.1 and Windows Server 2012 R2 added new built-in security groups, "Local account" and "Local account and member of Administrators group", for assigning permissions and rights to local accounts. Microsoft Security Advisory Patch 2871997 adds these groups to Windows 7, Windows 8, Windows Server 2008 R2, and Windows Server 2012. Use these groups instead of creating a group for local administrator accounts to apply to deny rights where required. Assign the group "Local account and member of Administrators group" or the more restrictive "Local account". Automated benchmarks will look for the groups referenced in the requirement. Use of other methods will require manual validation.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000001
- Vuln IDs
-
- V-56511
- Rule IDs
-
- SV-71667r1_rule
Checks: C-58069r2_chk
Verify the Start Type and Status of the Windows Error Reporting Service. Run "Services.msc". If the Windows Error Reporting Service does not have a Status of "Running" and a Start Type of "Automatic", this is a finding.
Fix: F-62433r2_fix
Configure the Start Type of the Windows Error Reporting Service to "Automatic" and ensure the service has a status of "Running".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000005
- Vuln IDs
-
- V-57453
- Rule IDs
-
- SV-71847r1_rule
Checks: C-58277r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: BypassDataThrottling Type: REG_DWORD Value: 1
Fix: F-62637r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> "Do not throttle additional data" to "Enabled".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- WN12-ER-000006
- Vuln IDs
-
- V-57455
- Rule IDs
-
- SV-71851r1_rule
Checks: C-58289r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: DontShowUI Type: REG_DWORD Value: 1
Fix: F-62649r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> "Prevent display of the user interface for critical errors" to "Enabled".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000007
- Vuln IDs
-
- V-57457
- Rule IDs
-
- SV-71859r1_rule
Checks: C-58291r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: CorporateWerServer Type: REG_SZ Value: " " (A single BLANK character to store the data on the system or the error reporting server name or IP address to forward the data to.)
Fix: F-62651r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Advanced Error Reporting Settings -> "Configure Corporate Windows Error Reporting" -> to "Enabled" with "Corporate server name:" defined as a single blank character to store the data on the system or the name or IP address of the local collection server.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN12-ER-000008
- Vuln IDs
-
- V-57459
- Rule IDs
-
- SV-71869r1_rule
Checks: C-58309r1_chk
This requirement is NA if Windows Error Reporting is not configured to forward reports to a collection server (see V-57457). If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: CorporateWerUseSSL Type: REG_DWORD Value: 1
Fix: F-62669r1_fix
This requirement is NA if Windows Error Reporting is not configured to forward reports to a collection server (see V-57457). Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Advanced Error Reporting Settings -> "Configure Corporate Windows Error Reporting" to "Enabled" with "Connect using SSL" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN12-ER-000009
- Vuln IDs
-
- V-57461
- Rule IDs
-
- SV-71879r1_rule
Checks: C-58319r1_chk
This requirement is NA if Windows Error Reporting is not configured to forward reports to a collection server (see V-57457). If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: CorporateWerPortNumber Type: REG_DWORD Value: 0x000004d0 (1232)
Fix: F-62679r1_fix
This requirement is NA if Windows Error Reporting is not configured to forward reports to a collection server (see V-57457). Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Advanced Error Reporting Settings -> "Configure Corporate Windows Error Reporting" to "Enabled" with "1232" defined as the "Server Port".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000010
- Vuln IDs
-
- V-57463
- Rule IDs
-
- SV-71889r1_rule
Checks: C-58329r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: DisableArchive Type: REG_DWORD Value: 0
Fix: F-62697r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Advanced Error Reporting Settings -> "Configure Report Archive" to "Enabled".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000011
- Vuln IDs
-
- V-57465
- Rule IDs
-
- SV-71899r1_rule
Checks: C-58339r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: ConfigureArchive Type: REG_DWORD Value: 0x00000002 (2)
Fix: F-62707r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Advanced Error Reporting Settings -> "Configure Report Archive" to "Enabled" with "Store All" selected for "Archive behavior:".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000012
- Vuln IDs
-
- V-57467
- Rule IDs
-
- SV-71909r1_rule
Checks: C-58349r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: MaxArchiveCount Type: REG_DWORD Value: 0x00000064 (100) (or greater)
Fix: F-62717r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Advanced Error Reporting Settings -> "Configure Report Archive" to "Enabled" with "Maximum number of reports to store:" set to "100" or greater.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000013
- Vuln IDs
-
- V-57469
- Rule IDs
-
- SV-71921r1_rule
Checks: C-58359r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: DisableQueue Type: REG_DWORD Value: 0
Fix: F-62727r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Advanced Error Reporting Settings -> "Configure Report Queue" to "Enabled".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000014
- Vuln IDs
-
- V-57471
- Rule IDs
-
- SV-71931r1_rule
Checks: C-58369r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: ForceQueue Type: REG_DWORD Value: 1
Fix: F-62737r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Advanced Error Reporting Settings -> "Configure Report Queue" to "Enabled" with "Queuing behavior:" to "Always queue".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000015
- Vuln IDs
-
- V-57473
- Rule IDs
-
- SV-71941r1_rule
Checks: C-58379r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: MaxQueueCount Type: REG_DWORD Value: 0x00000032 (50) (or greater)
Fix: F-62747r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Advanced Error Reporting Settings -> "Configure Report Queue" to "Enabled" with "Maximum number of reports to queue:" set to "50" or greater.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000016
- Vuln IDs
-
- V-57475
- Rule IDs
-
- SV-71951r1_rule
Checks: C-58389r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\ Value Name: QueuePesterInterval Type: REG_DWORD Value: 1
Fix: F-62757r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Advanced Error Reporting Settings -> "Configure Report Queue" to "Enabled" with "Number of days between solution check reminders:" set to "1".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000017
- Vuln IDs
-
- V-57477
- Rule IDs
-
- SV-71961r1_rule
Checks: C-58399r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\Consent\ Value Name: DefaultConsent Type: REG_DWORD Value: 0x00000004 (4)
Fix: F-62767r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Consent -> "Configure Default consent" to "Enabled" with "Send all data" selected for "Consent level".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- WN12-ER-000018
- Vuln IDs
-
- V-57479
- Rule IDs
-
- SV-71971r1_rule
Checks: C-58409r1_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\Consent\ Value Name: DefaultOverrideBehavior Type: REG_DWORD Value: 1
Fix: F-62777r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Error Reporting -> Consent -> "Ignore custom consent settings" to "Enabled".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000089
- Vuln IDs
-
- V-57633
- Rule IDs
-
- SV-72043r1_rule
Checks: C-58455r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Policy Change -> Authorization Policy Change - Success
Fix: F-62835r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Policy Change -> "Audit Authorization Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN12-AU-000090
- Vuln IDs
-
- V-57635
- Rule IDs
-
- SV-72045r1_rule
Checks: C-58457r1_chk
Security Option "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" must be set to "Enabled" (V-14230) for the detailed auditing subcategories to be effective. Use the AuditPol tool to review the current Audit Policy configuration: -Open a Command Prompt with elevated privileges ("Run as Administrator"). -Enter "AuditPol /get /category:*". Compare the AuditPol settings with the following. If the system does not audit the following, this is a finding. Policy Change -> Authorization Policy Change - Failure
Fix: F-62837r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Policy Change -> "Audit Authorization Policy Change" with "Failure" selected.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001774
- Version
- WN12-00-000018
- Vuln IDs
-
- V-57637
- Rule IDs
-
- SV-72047r3_rule
Checks: C-62107r8_chk
This is applicable to unclassified systems, for other systems this is NA. Verify the operating system employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs. If an application whitelisting program is not in use on the system, this is a finding. Configuration of whitelisting applications will vary by the program. AppLocker is a whitelisting application built into Windows Server 2012. If AppLocker is used, perform the following to view the configuration of AppLocker: Open PowerShell. If the AppLocker PowerShell module has not been previously imported, execute the following first: Import-Module AppLocker Execute the following command, substituting [c:\temp\file.xml] with a location and file name appropriate for the system: Get-AppLockerPolicy -Effective | Set-Content ('c:\temp\file.xml') This will produce an xml file with the effective settings that can be viewed in a browser or opened in a program such as Excel for review. Implementation guidance for AppLocker is available in the NSA paper "Application Whitelisting using Microsoft AppLocker" under the Microsoft Windows section of the following link: https://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml
Fix: F-66567r4_fix
This is applicable to unclassified systems, for other systems this is NA. Configure an application whitelisting program to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs. Configuration of whitelisting applications will vary by the program. AppLocker is a whitelisting application built into Windows Server 2012. If AppLocker is used, it is configured through group policy in Computer Configuration >> Windows Settings >> Security Settings >> Application Control Policies >> AppLocker. Implementation guidance for AppLocker is available in the NSA paper "Application Whitelisting using Microsoft AppLocker" under the Microsoft Windows section of the following link: https://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- WN12-SO-000092
- Vuln IDs
-
- V-57639
- Rule IDs
-
- SV-72049r2_rule
Checks: C-58461r2_chk
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Cryptography\ Value Name: ForceKeyProtection Type: REG_DWORD Value: 2
Fix: F-62841r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Force strong key protection for user keys stored on the computer" to "User must enter a password each time they use a key".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- WN12-00-000019
- Vuln IDs
-
- V-57641
- Rule IDs
-
- SV-72051r1_rule
Checks: C-58463r3_chk
If the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, verify protection methods such as TLS, encrypted VPNs, or IPSEC have been implemented. If protection methods have not been implemented, this is a finding.
Fix: F-62843r3_fix
Configure protection methods such as TLS, encrypted VPNs, or IPSEC when the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process to maintain the confidentiality and integrity.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- WN12-00-000020
- Vuln IDs
-
- V-57645
- Rule IDs
-
- SV-72055r1_rule
Checks: C-58467r3_chk
Verify systems that require additional protections due to factors such as inadequate physical protection or sensitivity of the data employ encryption to protect the confidentiality and integrity of all information at rest. If it does not, this is a finding.
Fix: F-62849r3_fix
Configure systems that require additional protections due to factors such as inadequate physical protection or sensitivity of the data to employ encryption to protect the confidentiality and integrity of all information at rest.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- WN12-GE-000056
- Vuln IDs
-
- V-57653
- Rule IDs
-
- SV-72063r1_rule
Checks: C-58475r1_chk
Verify the operating system automatically disables temporary user accounts after 72 hours. If it does not, this is a finding. Determine if temporary user accounts are used and identify any that may be in existence. For Domain Accounts: Open PowerShell. Run the command "Search-ADAccount -AccountExpiring" to determine if account expiration dates have been configured on any temporary accounts. For any accounts returned, run the command "Get-ADUser -Identity <Name> -Property WhenCreated" to determine when the account was created. Local accounts: Run "Net user <username>". This will list the account properties, including "Account Expires".
Fix: F-62855r3_fix
Configure temporary user accounts to be automatically disabled after 72 hours. Domain account can be configured with an account expiration date, under Account properties. Local accounts can be configured to expire with the command "Net user <username> /expires:<date>". Delete any temporary user accounts that are no longer necessary.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- WN12-GE-000057
- Vuln IDs
-
- V-57655
- Rule IDs
-
- SV-72065r1_rule
Checks: C-58477r2_chk
Verify the operating system does not automatically disable emergency accounts. If it does not, this is a finding. Determine if emergency accounts are used and identify any that may be in existence. For Domain Accounts: Open PowerShell. Run the command "Search-ADAccount -AccountExpiring" to determine if account expiration dates have been configured on any emergency accounts. Local accounts: Run "Net user <username>". This will list the account properties, including "Account Expires".
Fix: F-62857r3_fix
Ensure emergency accounts are not configured to automatically expire.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- WN12-AU-000203-02
- Vuln IDs
-
- V-57719
- Rule IDs
-
- SV-72133r1_rule
Checks: C-58511r2_chk
Verify the operating system, at a minimum, off-loads audit records of interconnected systems in real time and off-loads standalone systems weekly. If it does not, this is a finding.
Fix: F-62925r1_fix
Configure the operating system to, at a minimum, off-load audit records of interconnected systems in real time and off-load standalone systems weekly.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- WN12-AU-000213
- Vuln IDs
-
- V-57721
- Rule IDs
-
- SV-72135r1_rule
Checks: C-58513r2_chk
Verify the permissions on Event Viewer only allow TrustedInstaller permissions to change or modify. If any groups or accounts other than TrustedInstaller have Full control or Modify, this is a finding. Navigate to "%SystemRoot%\SYSTEM32". View the permissions on "Eventvwr.exe". The default permissions below satisfy this requirement. TrustedInstaller - Full Control Administrators, SYSTEM, Users, ALL APPLICATION PACKAGES - Read & Execute
Fix: F-62927r1_fix
Ensure only TrustedInstaller has permissions to change or modify Event Viewer ("%SystemRoot%\SYSTEM32Eventvwr.exe). The default permissions below satisfy this requirement. TrustedInstaller - Full Control Administrators, SYSTEM, Users, ALL APPLICATION PACKAGES - Read & Execute