Skip to content

Microsoft Windows Server 2022 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Windows Server 2022 must automatically remove or disable temporary user accounts after 72 hours.

    If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To mitigate this risk, automated termination of al...
    Rule Medium Severity
  • SRG-OS-000123-GPOS-00064

    Group
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2022 must not have the Fax Server role installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    Group
  • Windows Server 2022 must not have the Microsoft FTP service installed unless required by the organization.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2022 must not have the Peer Name Resolution Protocol installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2022 must not have Simple TCP/IP Services installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    Group
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2022 must not have the TFTP Client installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2022 must not the Server Message Block (SMB) v1 protocol installed.

    SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks and is not FIPS compliant.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB server.

    SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks as well as not being FIPS compliant.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB client.

    SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks as well as not being FIPS compliant.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2022 FTP servers must be configured to prevent anonymous logons.

    The FTP service allows remote users to access shared files and directories. Allowing anonymous FTP connections makes user auditing difficult. Using accounts that have administrator privileges to l...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2022 FTP servers must be configured to prevent access to the system drive.

    The FTP service allows remote users to access shared files and directories that could provide access to system resources and compromise the system, especially if the user can gain access to the roo...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    Group
  • The Windows Server 2022 time service must synchronize with an appropriate DOD time source.

    The Windows Time Service controls time synchronization settings. Time synchronization is essential for authentication and auditing purposes. If the Windows Time Service is used, it must synchronize...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2022 must have orphaned security identifiers (SIDs) removed from user rights.

    Accounts or groups given rights on a system may show up as unresolved SIDs for various reasons including deletion of the accounts or groups. If the account or group objects are reanimated, there is...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2022 must have Secure Boot enabled.

    Secure Boot is a standard that ensures systems boot only to a trusted operating system. Secure Boot is required to support additional security features in Windows, including Virtualization Based Se...
    Rule Medium Severity
  • SRG-OS-000329-GPOS-00128

    Group
  • Windows Server 2022 account lockout duration must be configured to 15 minutes or greater.

    The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the period of time that an account will remain locked after the specified nu...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • Windows Server 2022 must have the number of allowed bad logon attempts configured to three or less.

    The account lockout feature, when enabled, prevents brute-force password attacks on the system. The higher this value is, the less effective the account lockout feature will be in protecting the lo...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • Windows Server 2022 must have the period of time before the bad logon counter is reset configured to 15 minutes or greater.

    The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the period of time that must pass after failed logon attempts before the cou...
    Rule Medium Severity
  • SRG-OS-000077-GPOS-00045

    Group
  • SRG-OS-000076-GPOS-00044

    Group
  • SRG-OS-000075-GPOS-00043

    Group
  • SRG-OS-000078-GPOS-00046

    Group
  • Windows Server 2022 minimum password length must be configured to 14 characters.

    Information systems not protected with strong password schemes (including passwords of minimum length) provide the opportunity for anyone to crack the password, thus gaining access to the system an...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    Group
  • SRG-OS-000073-GPOS-00041

    Group
  • SRG-OS-000342-GPOS-00133

    Group
  • Windows Server 2022 audit records must be backed up to a different system or media than the system being audited.

    Protection of log data includes ensuring the log data is not accidentally lost or deleted. Audit information stored in one location is vulnerable to accidental or incidental deletion or alteration.
    Rule Medium Severity
  • SRG-OS-000479-GPOS-00224

    Group
  • Windows Server 2022 must, at a minimum, offload audit records of interconnected systems in real time and offload standalone or nondomain-joined systems weekly.

    Protection of log data includes assuring the log data is not accidentally lost or deleted. Audit information stored in one location is vulnerable to accidental or incidental deletion or alteration.
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • SRG-OS-000057-GPOS-00027

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules