Microsoft Windows Server 2019 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000327-GPOS-00127
Group -
SRG-OS-000327-GPOS-00127
Group -
SRG-OS-000327-GPOS-00127
Group -
Windows Server 2019 Active Directory Infrastructure object must be configured with proper audit settings.
When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or process to update the data without generating any tracking data. The impact...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
SRG-OS-000327-GPOS-00127
Group -
SRG-OS-000327-GPOS-00127
Group -
SRG-OS-000327-GPOS-00127
Group -
SRG-OS-000327-GPOS-00127
Group -
Windows Server 2019 must be configured to audit DS Access - Directory Service Access failures.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
SRG-OS-000329-GPOS-00128
Group -
SRG-OS-000341-GPOS-00132
Group -
Windows Server 2019 Application event log size must be configured to 32768 KB or greater.
Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and require frequent attention by administrative personnel.Rule Medium Severity -
SRG-OS-000341-GPOS-00132
Group -
Windows Server 2019 Security event log size must be configured to 196608 KB or greater.
Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and require frequent attention by administrative personnel.Rule Medium Severity -
SRG-OS-000341-GPOS-00132
Group -
Windows Server 2019 System event log size must be configured to 32768 KB or greater.
Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and require frequent attention by administrative personnel.Rule Medium Severity -
SRG-OS-000342-GPOS-00133
Group -
Windows Server 2019 audit records must be backed up to a different system or media than the system being audited.
Protection of log data includes assuring the log data is not accidentally lost or deleted. Audit information stored in one location is vulnerable to accidental or incidental deletion or alteration.Rule Medium Severity -
SRG-OS-000355-GPOS-00143
Group -
SRG-OS-000362-GPOS-00149
Group -
Windows Server 2019 must prevent users from changing installation options.
Installation options for applications are typically controlled by administrators. This setting prevents users from changing installation options that may bypass security features.Rule Medium Severity -
SRG-OS-000362-GPOS-00149
Group -
Windows Server 2019 must disable the Windows Installer Always install with elevated privileges option.
Standard user accounts must not be granted elevated privileges. Enabling Windows Installer to elevate privileges when installing applications can allow malicious persons and applications to gain fu...Rule High Severity -
SRG-OS-000363-GPOS-00150
Group -
Windows Server 2019 system files must be monitored for unauthorized changes.
Monitoring system files for changes against a baseline on a regular basis may help detect the possible introduction of malicious code on a system.Rule Medium Severity -
SRG-OS-000368-GPOS-00154
Group -
Windows Server 2019 Autoplay must be turned off for non-volume devices.
Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon as media is inserted into the drive. As a result, the setup file of programs or m...Rule High Severity -
SRG-OS-000368-GPOS-00154
Group -
Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands.
Allowing AutoRun commands to execute may introduce malicious code to a system. Configuring this setting prevents AutoRun commands from executing.Rule High Severity -
SRG-OS-000368-GPOS-00154
Group -
Windows Server 2019 AutoPlay must be disabled for all drives.
Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon media is inserted into the drive. As a result, the setup file of programs or musi...Rule High Severity -
SRG-OS-000370-GPOS-00155
Group -
SRG-OS-000373-GPOS-00157
Group -
Windows Server 2019 must not save passwords in the Remote Desktop Client.
Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to another system. The system must be configured to prevent users from saving pa...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
Group -
Windows Server 2019 Remote Desktop Services must always prompt a client for passwords upon connection.
This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Disabling this setting would allow anyone to use the stored credentials in a...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
Group -
Windows Server 2019 Windows Remote Management (WinRM) service must not store RunAs credentials.
Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Windows Remote Management will prevent them from being used with plug-ins. S...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
Group -
Windows Server 2019 User Account Control approval mode for the built-in Administrator must be enabled.
User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures the built-in Administrator...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
Group -
Windows Server 2019 User Account Control must automatically deny standard user requests for elevation.
User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting controls the behavior of elevation wh...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
Group -
SRG-OS-000379-GPOS-00164
Group -
Windows Server 2019 must restrict unauthenticated Remote Procedure Call (RPC) clients from connecting to the RPC server on domain-joined member servers and standalone or nondomain-joined systems.
Unauthenticated RPC clients may allow anonymous access to sensitive information. Configuring RPC to restrict unauthenticated RPC clients from connecting to the RPC server will prevent anonymous con...Rule Medium Severity -
SRG-OS-000379-GPOS-00164
Group -
Windows Server 2019 computer account password must not be prevented from being reset.
Computer account passwords are changed automatically on a regular basis. Disabling automatic password changes can make the system more vulnerable to malicious access. Frequent password changes can ...Rule Medium Severity -
SRG-OS-000393-GPOS-00173
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.