Skip to content

Microsoft Windows Server 2019 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Windows Server 2019 machine inactivity limit must be set to 15 minutes or less, locking the system with the screen saver.

    Unattended systems are susceptible to unauthorized use and should be locked when unattended. The screen saver should be set at a maximum of 15 minutes and be password protected. This protects criti...
    Rule Medium Severity
  • Windows Server 2019 Remote Desktop Services must be configured with the client connection encryption set to High Level.

    Remote connections must be encrypted to prevent interception of data or sensitive information. Selecting "High Level" will ensure encryption of Remote Desktop Services sessions in both directions. ...
    Rule Medium Severity
  • Windows Server 2019 permissions for the System event log must prevent access by non-privileged accounts.

    Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...
    Rule Medium Severity
  • Windows Server 2019 must force audit policy subcategory settings to override audit policy category settings.

    Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...
    Rule Medium Severity
  • Windows Server 2019 PKI certificates associated with user accounts must be issued by a DoD PKI or an approved External Certificate Authority (ECA).

    A PKI implementation depends on the practices established by the Certificate Authority (CA) to ensure the implementation is secure. Without proper practices, the certificates issued by a CA have li...
    Rule High Severity
  • Windows Server 2019 must have the DoD Interoperability Root Certificate Authority (CA) cross-certificates installed in the Untrusted Certificates Store on unclassified systems.

    To ensure users do not experience denial of service when performing certificate-based authentication to DoD websites due to the system chaining to a root other than DoD Root CAs, the DoD Interopera...
    Rule Medium Severity
  • Windows Server 2019 users must be required to enter a password to access private keys stored on the computer.

    If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...
    Rule Medium Severity
  • Windows Server 2019 reversible password encryption must be disabled.

    Storing passwords using reversible encryption is essentially the same as storing clear-text versions of the passwords, which are easily compromised. For this reason, this policy must never be enabled.
    Rule High Severity
  • Windows Server 2019 unencrypted passwords must not be sent to third-party Server Message Block (SMB) servers.

    Some non-Microsoft SMB servers only support unencrypted (plain-text) password authentication. Sending plain-text passwords across the network when authenticating to an SMB server reduces the overal...
    Rule Medium Severity
  • Windows Server 2019 maximum password age must be configured to 60 days or less.

    The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the passwords. Scheduled changing of passwords hinders the ability of unauthorized system ...
    Rule Medium Severity
  • Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access this computer from the network" right may access resources on...
    Rule Medium Severity
  • Windows Server 2019 "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access this computer from the network" user right may access resourc...
    Rule Medium Severity
  • Windows Server 2019 "Deny access to this computer from the network" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny access to this computer from the network" user right defines the accounts tha...
    Rule Medium Severity
  • Windows Server 2019 Allow log on locally user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Allow log on locally" user right can log on interactively to a system.
    Rule Medium Severity
  • Windows Server 2019 must not have the Server Message Block (SMB) v1 protocol installed.

    SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks and is not FIPS compliant.
    Rule Medium Severity
  • Windows Server 2019 must not have Windows PowerShell 2.0 installed.

    Windows PowerShell 5.x added advanced logging features that can provide additional detail when malware has been run on a system. Disabling the Windows PowerShell 2.0 mitigates against a downgrade a...
    Rule Medium Severity
  • Windows Server 2019 Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.

    Some features may communicate with the vendor, sending system information or downloading data or components for the feature. Turning off this capability will prevent potentially sensitive informati...
    Rule Low Severity
  • Windows Server 2019 Windows Defender SmartScreen must be enabled.

    Windows Defender SmartScreen helps protect systems from programs downloaded from the internet that may be malicious. Enabling SmartScreen can block potentially malicious programs or warn users.
    Rule Medium Severity
  • Windows Server 2019 must disable Basic authentication for RSS feeds over HTTP.

    Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.
    Rule Medium Severity
  • Windows Server 2019 must prevent Indexing of encrypted files.

    Indexing of encrypted files may expose sensitive data. This setting prevents encrypted files from being indexed.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules