Microsoft Windows Server 2019 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Windows Server 2019 Windows Remote Management (WinRM) client must not allow unencrypted traffic.
Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connections must be encrypted to prevent this. Satisfies: SRG-OS-000393-GPOS-0017...Rule Medium Severity -
SRG-OS-000393-GPOS-00173
Group -
SRG-OS-000396-GPOS-00176
Group -
Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
Directory data that is not appropriately encrypted is subject to compromise. Commercial-grade encryption does not provide adequate protection when the classification level of directory data in tran...Rule Medium Severity -
SRG-OS-000420-GPOS-00186
Group -
SRG-OS-000423-GPOS-00187
Group -
SRG-OS-000423-GPOS-00187
Group -
Windows Server 2019 setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not all information is encrypted. If this policy is enabled, outgoing secure c...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
Windows Server 2019 setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.
Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not all information is encrypted. If this policy is enabled, outgoing secure c...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
Windows Server 2019 setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the channel is not integrity checked. If this policy is enabled, outgoing secu...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
Windows Server 2019 must be configured to require a strong session key.
A computer connecting to a domain controller will establish a secure channel. The secure channel connection may be subject to compromise, such as hijacking or eavesdropping, if strong session keys ...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
SRG-OS-000423-GPOS-00187
Group -
Windows Server 2019 setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.
The server message block (SMB) protocol provides the basis for many network operations. If this policy is enabled, the SMB client will request packet signing when communicating with an SMB server t...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
SRG-OS-000423-GPOS-00187
Group -
Windows Server 2019 setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.
The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB ...Rule Medium Severity -
SRG-OS-000425-GPOS-00189
Group -
Windows Server 2019 must implement protection methods such as TLS, encrypted VPNs, or IPsec if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during pa...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
Group -
Windows Server 2019 Explorer Data Execution Prevention must be enabled.
Data Execution Prevention provides additional protection by performing checks on memory to help prevent malicious code from running. This setting will prevent Data Execution Prevention from being t...Rule Medium Severity -
SRG-OS-000470-GPOS-00214
Group -
SRG-OS-000470-GPOS-00214
Group -
Windows Server 2019 must be configured to audit Account Logon - Credential Validation failures.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000470-GPOS-00214
Group -
SRG-OS-000470-GPOS-00214
Group -
Windows Server 2019 must be configured to audit Logon/Logoff - Special Logon successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000470-GPOS-00214
Group -
SRG-OS-000470-GPOS-00214
Group -
Windows Server 2019 must be configured to audit Object Access - Other Object Access Events failures.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000472-GPOS-00217
Group -
Windows Server 2019 must be configured to audit logoff successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000474-GPOS-00219
Group -
Windows Server 2019 must be configured to audit Detailed Tracking - Plug and Play Events successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000474-GPOS-00219
Group -
Windows Server 2019 must be configured to audit Object Access - Removable Storage successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000474-GPOS-00219
Group -
SRG-OS-000478-GPOS-00223
Group -
Windows Server 2019 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
This setting ensures the system uses algorithms that are FIPS-compliant for encryption, hashing, and signing. FIPS-compliant algorithms meet specific standards established by the U.S. Government an...Rule Medium Severity -
SRG-OS-000479-GPOS-00224
Group -
Windows Server 2019 must, at a minimum, offload audit records of interconnected systems in real time and offload standalone or nondomain-joined systems weekly.
Protection of log data includes ensuring the log data is not accidentally lost or deleted. Audit information stored in one location is vulnerable to accidental or incidental deletion or alteration.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently introduced during a session that has been granted full privileges.Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
Backup Operators are able to read and write to any file in the system, regardless of the rights assigned to it. Backup and restore rights permit users to circumvent the file access restrictions pre...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.