Microsoft Windows Server 2022 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000423-GPOS-00187
Group -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2022 must not allow anonymous SID/Name translation.
Allowing anonymous SID/Name translation can provide sensitive information for accessing a system. Only authorized users must be able to perform such translations.Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000138-GPOS-00069
Group -
Windows Server 2022 must not allow anonymous enumeration of shares.
Allowing anonymous logon users (null session connections) to list all account names and enumerate all shared resources can provide a map of potential points to attack the system.Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2022 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
Access by anonymous users must be restricted. If this setting is enabled, anonymous users have the same rights and permissions as the built-in Everyone group. Anonymous users must not have these pe...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
Group -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2022 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
Services using Local System that use Negotiate when reverting to NTLM authentication may gain unauthorized access if allowed to authenticate anonymously versus using the computer identity.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2022 must prevent NTLM from falling back to a Null session.
NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2022 must prevent PKU2U authentication using online identities.
PKU2U is a peer-to-peer authentication protocol. This setting prevents online identities from authenticating to domain-joined systems. Authentication will be centrally managed with Windows user acc...Rule Medium Severity -
SRG-OS-000120-GPOS-00061
Group -
SRG-OS-000073-GPOS-00041
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.