Microsoft Windows Server 2019 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Windows Server 2019 domain controllers must be configured to allow reset of machine account passwords.
Enabling this setting on all domain controllers in a domain prevents domain members from changing their computer account passwords. If these passwords are weak or compromised, the inability to chan...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 must limit the caching of logon credentials to four or less on domain-joined member servers.
The default Windows configuration caches the last logon credentials for users who log on interactively to a system. This feature is provided for system availability reasons, such as the user's mach...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 must be running Credential Guard on domain-joined member servers.
Credential Guard uses virtualization-based security to protect data that could be used in credential theft attacks if compromised. This authentication information, which was stored in the Local Sec...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 must not allow anonymous SID/Name translation.
Allowing anonymous SID/Name translation can provide sensitive information for accessing a system. Only authorized users must be able to perform such translations.Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.
Anonymous enumeration of SAM accounts allows anonymous logon users (null session connections) to list all accounts names, thus providing a list of potential points to attack the system.Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
Access by anonymous users must be restricted. If this setting is enabled, anonymous users have the same rights and permissions as the built-in Everyone group. Anonymous users must not have these pe...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
Services using Local System that use Negotiate when reverting to NTLM authentication may gain unauthorized access if allowed to authenticate anonymously versus using the computer identity.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 must prevent NTLM from falling back to a Null session.
NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
Microsoft has implemented a variety of security support providers for use with Remote Procedure Call (RPC) sessions. All of the options must be enabled to ensure the maximum security level.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 must preserve zone information when saving attachments.
Attachments from outside sources may contain malicious code. Preserving zone of origin (Internet, intranet, local, restricted) information on file attachments allows Windows to determine risk.Rule Medium Severity -
SRG-OS-000480-GPOS-00229
Group -
Windows Server 2019 must disable automatically signing in the last interactive user after a system-initiated restart.
Windows can be configured to automatically sign the user back in after a Windows Update restart. Some protections are in place to help ensure this is done in a secure fashion; however, disabling th...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2019 must have a host-based firewall installed and enabled.
A firewall provides a line of defense against attack, allowing or blocking inbound and outbound connections based on a set of rules.Rule Medium Severity -
SRG-OS-000041-GPOS-00019
Group -
SRG-OS-000080-GPOS-00048
Group -
Windows Server 2019 must be configured for certificate-based authentication for domain controllers.
Active Directory domain services elevation of privilege vulnerability could allow a user rights to the system, such as administrative and other high-level capabilities.Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
Windows Server 2019 must be configured to audit Account Management - User Account Management successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
Windows Server 2019 must be configured to audit Account Management - User Account Management failures.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
Windows Server 2019 machine inactivity limit must be set to 15 minutes or less, locking the system with the screen saver.
Unattended systems are susceptible to unauthorized use and should be locked when unattended. The screen saver should be set at a maximum of 15 minutes and be password protected. This protects criti...Rule Medium Severity -
Windows Server 2019 Remote Desktop Services must be configured with the client connection encryption set to High Level.
Remote connections must be encrypted to prevent interception of data or sensitive information. Selecting "High Level" will ensure encryption of Remote Desktop Services sessions in both directions. ...Rule Medium Severity -
Windows Server 2019 permissions for the System event log must prevent access by non-privileged accounts.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
Windows Server 2019 must force audit policy subcategory settings to override audit policy category settings.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
Windows Server 2019 PKI certificates associated with user accounts must be issued by a DoD PKI or an approved External Certificate Authority (ECA).
A PKI implementation depends on the practices established by the Certificate Authority (CA) to ensure the implementation is secure. Without proper practices, the certificates issued by a CA have li...Rule High Severity -
Windows Server 2019 must have the DoD Interoperability Root Certificate Authority (CA) cross-certificates installed in the Untrusted Certificates Store on unclassified systems.
To ensure users do not experience denial of service when performing certificate-based authentication to DoD websites due to the system chaining to a root other than DoD Root CAs, the DoD Interopera...Rule Medium Severity -
Windows Server 2019 users must be required to enter a password to access private keys stored on the computer.
If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...Rule Medium Severity -
Windows Server 2019 reversible password encryption must be disabled.
Storing passwords using reversible encryption is essentially the same as storing clear-text versions of the passwords, which are easily compromised. For this reason, this policy must never be enabled.Rule High Severity -
Windows Server 2019 unencrypted passwords must not be sent to third-party Server Message Block (SMB) servers.
Some non-Microsoft SMB servers only support unencrypted (plain-text) password authentication. Sending plain-text passwords across the network when authenticating to an SMB server reduces the overal...Rule Medium Severity -
Windows Server 2019 maximum password age must be configured to 60 days or less.
The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the passwords. Scheduled changing of passwords hinders the ability of unauthorized system ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.