Skip to content

Microsoft Windows Server 2019 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands.

    Allowing AutoRun commands to execute may introduce malicious code to a system. Configuring this setting prevents AutoRun commands from executing.
    Rule High Severity
  • SRG-OS-000368-GPOS-00154

    Group
  • Windows Server 2019 AutoPlay must be disabled for all drives.

    Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon media is inserted into the drive. As a result, the setup file of programs or musi...
    Rule High Severity
  • SRG-OS-000370-GPOS-00155

    Group
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 must not save passwords in the Remote Desktop Client.

    Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to another system. The system must be configured to prevent users from saving pa...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 Remote Desktop Services must always prompt a client for passwords upon connection.

    This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Disabling this setting would allow anyone to use the stored credentials in a...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 Windows Remote Management (WinRM) service must not store RunAs credentials.

    Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Windows Remote Management will prevent them from being used with plug-ins. S...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 User Account Control approval mode for the built-in Administrator must be enabled.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures the built-in Administrator...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 User Account Control must automatically deny standard user requests for elevation.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting controls the behavior of elevation wh...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • SRG-OS-000379-GPOS-00164

    Group
  • Windows Server 2019 must restrict unauthenticated Remote Procedure Call (RPC) clients from connecting to the RPC server on domain-joined member servers and standalone or nondomain-joined systems.

    Unauthenticated RPC clients may allow anonymous access to sensitive information. Configuring RPC to restrict unauthenticated RPC clients from connecting to the RPC server will prevent anonymous con...
    Rule Medium Severity
  • SRG-OS-000379-GPOS-00164

    Group
  • Windows Server 2019 computer account password must not be prevented from being reset.

    Computer account passwords are changed automatically on a regular basis. Disabling automatic password changes can make the system more vulnerable to malicious access. Frequent password changes can ...
    Rule Medium Severity
  • SRG-OS-000393-GPOS-00173

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules