Skip to content

Microsoft Windows Server 2019 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 FTP servers must be configured to prevent access to the system drive.

    The FTP service allows remote users to access shared files and directories that could provide access to system resources and compromise the system, especially if the user can gain access to the roo...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must have orphaned security identifiers (SIDs) removed from user rights.

    Accounts or groups given rights on a system may show up as unresolved SIDs for various reasons including deletion of the accounts or groups. If the account or group objects are reanimated, there i...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must have Secure Boot enabled.

    Secure Boot is a standard that ensures systems boot only to a trusted operating system. Secure Boot is required to support additional security features in Windows, including Virtualization Based Se...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.

    Configuring the system to disable IPv6 source routing protects against spoofing.
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.

    Configuring the system to disable IP source routing protects against spoofing.
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.

    Allowing ICMP redirect of routes can lead to traffic not being routed properly. When disabled, this forces ICMP to be routed via the shortest path first.
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 insecure logons to an SMB server must be disabled.

    Insecure guest logons allow unauthenticated access to shared folders. Shared resources on a system must require authentication to establish proper access.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.

    Additional security requirements are applied to UNC paths specified in hardened UNC paths before allowing access to them. This aids in preventing tampering with or spoofing of connections to these ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.

    Virtualization-based security (VBS) provides the platform for the additional security features Credential Guard and virtualization-based protection of code integrity. Secure Boot is the minimum sec...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules