Skip to content

Microsoft Windows Server 2019 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000073-GPOS-00041

    Group
  • Windows Server 2019 must be configured to prevent the storage of the LAN Manager hash of passwords.

    The LAN Manager hash uses a weak encryption algorithm and there are several tools available that use this hash to retrieve account passwords. This setting controls whether a LAN Manager hash of the...
    Rule High Severity
  • SRG-OS-000074-GPOS-00042

    Group
  • SRG-OS-000075-GPOS-00043

    Group
  • Windows Server 2019 minimum password age must be configured to at least one day.

    Permitting passwords to be changed in immediate succession within the same day allows users to cycle passwords through their history database. This enables users to effectively negate the purpose o...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • Windows Server 2019 passwords for the built-in Administrator account must be changed at least every 60 days.

    The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the password. The built-in Administrator account is not generally used and its password mi...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • Windows Server 2019 passwords must be configured to expire.

    Passwords that do not expire or are reused increase the exposure of a password with greater probability of being discovered or cracked.
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • SRG-OS-000077-GPOS-00045

    Group
  • Windows Server 2019 password history must be configured to 24 passwords remembered.

    A system is more vulnerable to unauthorized access when system users recycle the same password several times without being required to change to a unique password on a regularly scheduled basis. Th...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • Windows Server 2019 manually managed application account passwords must be at least 14 characters in length.

    Application/service account passwords must be of sufficient length to prevent being easily cracked. Application/service accounts that are manually managed must have passwords at least 14 characters...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • Windows Server 2019 minimum password length must be configured to 14 characters.

    Information systems not protected with strong password schemes (including passwords of minimum length) provide the opportunity for anyone to crack the password, thus gaining access to the system an...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 local volumes must use a format that supports NTFS attributes.

    The ability to set access permissions and auditing is critical to maintaining the security and proper access controls of a system. To support this, volumes must be formatted using a file system tha...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 non-administrative accounts or groups must only have print permissions on printer shares.

    Windows shares are a means by which files, folders, printers, and other resources can be published for network users to access. Improper configuration can permit access to devices and data beyond a...
    Rule Low Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Allow log on through Remote Desktop Services" user right can access ...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny access to this computer from the network" user right defines the accounts tha...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a batch job" user right defines accounts that are prevented from lo...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a service" user right defines accounts that are denied logon as a s...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on locally" user right defines accounts that are prevented from logging o...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 "Deny log on as a batch job" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a batch job" user right defines accounts that are prevented from lo...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 "Deny log on as a service" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a service" user right defines accounts that are denied logon as a s...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 "Deny log on locally" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on locally" user right defines accounts that are prevented from logging o...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2019 must have the roles and features required by the system documented.

    Unnecessary roles and features increase the attack surface of a system. Limiting roles and features of a system to only those necessary reduces this potential. The standard installation option (pre...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2019 must not have the Fax Server role installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2019 must not have the Peer Name Resolution Protocol installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2019 must not have Simple TCP/IP Services installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2019 must not have the TFTP Client installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules