Skip to content

Microsoft Windows Server 2019 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access this computer from the network" right may access resources on...
    Rule Medium Severity
  • Windows Server 2019 "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access this computer from the network" user right may access resourc...
    Rule Medium Severity
  • Windows Server 2019 "Deny access to this computer from the network" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny access to this computer from the network" user right defines the accounts tha...
    Rule Medium Severity
  • Windows Server 2019 Allow log on locally user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Allow log on locally" user right can log on interactively to a system.
    Rule Medium Severity
  • Windows Server 2019 must not have the Server Message Block (SMB) v1 protocol installed.

    SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks and is not FIPS compliant.
    Rule Medium Severity
  • Windows Server 2019 must not have Windows PowerShell 2.0 installed.

    Windows PowerShell 5.x added advanced logging features that can provide additional detail when malware has been run on a system. Disabling the Windows PowerShell 2.0 mitigates against a downgrade a...
    Rule Medium Severity
  • Windows Server 2019 Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.

    Some features may communicate with the vendor, sending system information or downloading data or components for the feature. Turning off this capability will prevent potentially sensitive informati...
    Rule Low Severity
  • Windows Server 2019 Windows Defender SmartScreen must be enabled.

    Windows Defender SmartScreen helps protect systems from programs downloaded from the internet that may be malicious. Enabling SmartScreen can block potentially malicious programs or warn users.
    Rule Medium Severity
  • Windows Server 2019 must disable Basic authentication for RSS feeds over HTTP.

    Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.
    Rule Medium Severity
  • Windows Server 2019 must prevent Indexing of encrypted files.

    Indexing of encrypted files may expose sensitive data. This setting prevents encrypted files from being indexed.
    Rule Medium Severity
  • Windows Server 2019 domain controllers must run on a machine dedicated to that function.

    Executing application servers on the same host machine with a directory server may substantially weaken the security of the directory server. Web or database server applications usually require the...
    Rule Medium Severity
  • Windows Server 2019 local users on domain-joined member servers must not be enumerated.

    The username is one part of logon credentials that could be used to gain access to a system. Preventing the enumeration of users limits this information to authorized personnel.
    Rule Medium Severity
  • Windows Server 2019 must not have the Microsoft FTP service installed unless required by the organization.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption.
    Rule Medium Severity
  • Windows Server 2019 must not have the Telnet Client installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • Windows Server 2019 shared user accounts must not be permitted.

    Shared accounts (accounts where two or more people log on with the same user identification) do not provide adequate identification and authentication. There is no way to provide for nonrepudiation...
    Rule Medium Severity
  • Windows Server 2019 accounts must require passwords.

    The lack of password protection enables anyone to gain access to the information system, which opens a backdoor opportunity for intruders to compromise the system as well as other resources. Accoun...
    Rule Medium Severity
  • Windows Server 2019 Active Directory user accounts, including administrators, must be configured to require the use of a Common Access Card (CAC), Personal Identity Verification (PIV)-compliant hardware token, or Alternate Logon Token (ALT) for user authentication.

    Smart cards such as the CAC support a two-factor authentication technique. This provides a higher level of trust in the asserted identity than use of the username and password for authentication. ...
    Rule Medium Severity
  • Windows Server 2019 Kerberos user logon restrictions must be enforced.

    This policy setting determines whether the Kerberos Key Distribution Center (KDC) validates every request for a session ticket against the user rights policy of the target computer. The policy is e...
    Rule Medium Severity
  • Windows Server 2019 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.

    This setting determines the maximum amount of time (in minutes) that a granted session ticket can be used to access a particular service. Session tickets are used only to authenticate new connectio...
    Rule Medium Severity
  • Windows Server 2019 Kerberos user ticket lifetime must be limited to 10 hours or less.

    In Kerberos, there are two types of tickets: Ticket Granting Tickets (TGTs) and Service Tickets. Kerberos tickets have a limited lifetime so the time an attacker has to implement an attack is limit...
    Rule Medium Severity
  • Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.

    This setting determines the period of time (in days) during which a user's TGT may be renewed. This security configuration limits the amount of time an attacker has to crack the TGT and gain access...
    Rule Medium Severity
  • Windows Server 2019 computer clock synchronization tolerance must be limited to five minutes or less.

    This setting determines the maximum time difference (in minutes) that Kerberos will tolerate between the time on a client's clock and the time on a server's clock while still considering the two cl...
    Rule Medium Severity
  • Windows Server 2019 outdated or unused accounts must be removed or disabled.

    Outdated or unused accounts provide penetration points that may go undetected. Inactive accounts must be deleted if no longer necessary or, if still required, disabled until needed.
    Rule Medium Severity
  • Windows Server 2019 Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.

    Certain encryption types are no longer considered secure. The DES and RC4 encryption suites must not be used for Kerberos encryption. Note: Organizations with domain controllers running earlier ve...
    Rule Medium Severity
  • Windows Server 2019 must have the built-in guest account disabled.

    A system faces an increased vulnerability threat if the built-in guest account is not disabled. This is a known account that exists on all Windows systems and cannot be deleted. This account is ini...
    Rule Medium Severity
  • Windows Server 2019 must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.

    Emergency administrator accounts are privileged accounts established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activatio...
    Rule Medium Severity
  • Windows Server 2019 Windows Remote Management (WinRM) client must not use Basic authentication.

    Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.
    Rule High Severity
  • Windows Server 2019 Windows Remote Management (WinRM) client must not use Digest authentication.

    Digest authentication is not as strong as other options and may be subject to man-in-the-middle attacks. Disallowing Digest authentication will reduce this potential.
    Rule Medium Severity
  • Windows Server 2019 Windows Remote Management (WinRM) service must not use Basic authentication.

    Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.
    Rule High Severity
  • Windows Server 2019 administrator accounts must not be enumerated during elevation.

    Enumeration of administrator accounts when elevating can provide part of the logon information to an unauthorized user. This setting configures the system to always require users to type in a usern...
    Rule Medium Severity
  • Windows Server 2019 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.

    A compromised local administrator account can provide means for an attacker to move laterally between domain systems. With User Account Control enabled, filtering the privileged token for local ad...
    Rule Medium Severity
  • Windows Server 2019 UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting prevents User Interface Accessibility...
    Rule Medium Severity
  • Windows Server 2019 User Account Control must, at a minimum, prompt administrators for consent on the secure desktop.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures the elevation requirements...
    Rule Medium Severity
  • Windows Server 2019 User Account Control must be configured to detect application installations and prompt for elevation.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting requires Windows to respond to applic...
    Rule Medium Severity
  • Windows Server 2019 User Account Control (UAC) must only elevate UIAccess applications that are installed in secure locations.

    UAC is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures Windows to only allow applications installed in a...
    Rule Medium Severity
  • Windows Server 2019 Remote Desktop Services must prevent drive redirection.

    Preventing users from sharing the local drives on their client computers with Remote Session Hosts that they access helps reduce possible exposure of sensitive data.
    Rule Medium Severity
  • Windows Server 2019 data files owned by users must be on a different logical partition from the directory server data files.

    When directory service data files, especially for directories used for identification, authentication, or authorization, reside on the same logical partition as user-owned files, the directory serv...
    Rule Medium Severity
  • Windows Server 2019 must not allow anonymous enumeration of shares.

    Allowing anonymous logon users (null session connections) to list all account names and enumerate all shared resources can provide a map of potential points to attack the system.
    Rule High Severity
  • Windows Server 2019 directory service must be configured to terminate LDAP-based network connections to the directory server after five minutes of inactivity.

    The failure to terminate inactive network connections increases the risk of a successful attack on the directory server. The longer an established session is in progress, the more time an attacker ...
    Rule Low Severity
  • Windows Server 2019 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where Endpoint Security Solution (ESS) is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).

    Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the operating system or other system components may remain vulnerable to the exploits prese...
    Rule Medium Severity
  • Windows Server 2019 must be configured to audit Logon/Logoff - Account Lockout failures.

    Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...
    Rule Medium Severity
  • Windows Server 2019 Deny log on through Remote Desktop Services user right on domain controllers must be configured to prevent unauthenticated access.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on through Remote Desktop Services" user right defines the accounts that ...
    Rule Medium Severity
  • Windows Server 2019 Active Directory Group Policy objects must have proper access control permissions.

    When directory service database objects do not have appropriate access control permissions, it may be possible for malicious users to create, read, update, or delete the objects and degrade or dest...
    Rule High Severity
  • Windows Server 2019 Active Directory Domain Controllers Organizational Unit (OU) object must have the proper access control permissions.

    When Active Directory objects do not have appropriate access control permissions, it may be possible for malicious users to create, read, update, or delete the objects and degrade or destroy the in...
    Rule High Severity
  • Windows Server 2019 must restrict remote calls to the Security Account Manager (SAM) to Administrators on domain-joined member servers and standalone or nondomain-joined systems.

    The Windows SAM stores users' passwords. Restricting Remote Procedure Call (RPC) connections to the SAM to Administrators helps protect those credentials.
    Rule Medium Severity
  • Windows Server 2019 Create a token object user right must not be assigned to any groups or accounts.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Create a token object" user right allows a process to create an access token. This...
    Rule High Severity
  • Windows Server 2019 Create symbolic links user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create symbolic links" user right can create pointers to other objec...
    Rule Medium Severity
  • Windows Server 2019 Generate security audits user right must only be assigned to Local Service and Network Service.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Generate security audits" user right specifies users and processes that can genera...
    Rule Medium Severity
  • Windows Server 2019 Perform volume maintenance tasks user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Perform volume maintenance tasks" user right can manage volume and d...
    Rule Medium Severity
  • Windows Server 2019 Restore files and directories user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Restore files and directories" user right can circumvent file and di...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules