Skip to content

Microsoft SCOM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516-NDM-000351

    <GroupDescription></GroupDescription>
    Group
  • The Microsoft SCOM server must be running Windows operating system that supports modern security features such as virtualization based security.

    &lt;VulnDiscussion&gt;Network devices running older but supported operating systems lack modern security features that mitigate attack surfaces. At...
    Rule High Severity
  • SRG-APP-000516-NDM-000340

    <GroupDescription></GroupDescription>
    Group
  • SCOM unsealed management packs must be backed up regularly.

    &lt;VulnDiscussion&gt;SCOM's configuration information is stored within unsealed management packs. Even without SQL backups, a catastrophic failure...
    Rule Low Severity
  • SRG-APP-000516-NDM-000344

    <GroupDescription></GroupDescription>
    Group
  • If a certificate is used for the SCOM web console, this certificate must be generated by a DoD CA or CA approved by the organization.

    &lt;VulnDiscussion&gt;Web certificates should always be signed by a trusted signer and never self-signed.&lt;/VulnDiscussion&gt;&lt;FalsePositives&...
    Rule Low Severity
  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • The Microsoft SCOM SNMP Monitoring in SCOM must use SNMP V3.

    &lt;VulnDiscussion&gt;SNMP Versions 1 and 2 do not use a FIPS-validated Keyed-Hash message Authentication Code (HMAC). SCOM has the capability of m...
    Rule Low Severity
  • SRG-APP-000080-NDM-000345

    <GroupDescription></GroupDescription>
    Group
  • The Microsoft SCOM server must use an active directory group that contains authorized members of the SCOM Administrators Role Group.

    &lt;VulnDiscussion&gt;During the initial installation, SCOM grants the Builtin\Administrators group administrator rights to the application. This c...
    Rule Medium Severity
  • SRG-APP-000080-NDM-000345

    <GroupDescription></GroupDescription>
    Group
  • The default Builtin\Administrators group must be removed from the SCOM Administrators Role Group.

    &lt;VulnDiscussion&gt;SCOM servers with default well-known operating system groups defined the SCOM Administrators Global Group may allow a local a...
    Rule Medium Severity
  • SRG-APP-000412-NDM-000331

    <GroupDescription></GroupDescription>
    Group
  • All SCOM servers must be configured for FIPS 140-2 compliance.

    &lt;VulnDiscussion&gt;Unapproved mechanisms used for authentication to the cryptographic module are not validated and therefore cannot be relied on...
    Rule High Severity
  • SRG-APP-000435-NDM-000315

    <GroupDescription></GroupDescription>
    Group
  • A host-based firewall must be configured on the SCOM management servers.

    &lt;VulnDiscussion&gt;To prevent a DDoS, a firewall that inspects and drops packets must be configured.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules