Microsoft SCOM Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The SCOM Web Console must be configured for HTTPS.
<VulnDiscussion>HTTP sessions are sent in clear text and can allow a man in the middle to recon the environment. The web console itself does ...Rule High Severity -
SRG-APP-000224-NDM-000270
<GroupDescription></GroupDescription>Group -
SRG-APP-000317-NDM-000282
<GroupDescription></GroupDescription>Group -
Members of the SCOM Administrators Group must be reviewed to ensure access is still required.
<VulnDiscussion>When people leave their roles, their group memberships are often times not updated.</VulnDiscussion><FalsePositives&...Rule Medium Severity -
SRG-APP-000033-NDM-000212
<GroupDescription></GroupDescription>Group -
Manually configured SCOM Run As accounts must be set to More Secure distribution.
<VulnDiscussion>The Microsoft SCOM privileged Run As accounts are used to execute work flow tasks on target endpoints. A SCOM Run As account ...Rule High Severity -
SRG-APP-000033-NDM-000212
<GroupDescription></GroupDescription>Group -
SCOM Run As accounts used to manage Linux/UNIX endpoints must be configured for least privilege.
<VulnDiscussion>The Microsoft SCOM privileged Run As accounts are used to execute work flow tasks on target endpoints. A SCOM Run As account ...Rule High Severity -
SRG-APP-000033-NDM-000212
<GroupDescription></GroupDescription>Group -
The Microsoft SCOM Agent Action Account must be a local system account.
<VulnDiscussion>The SCOM agent action account is the account agent used to perform tasks on an individual machine. By default, the action age...Rule Medium Severity -
SRG-APP-000033-NDM-000212
<GroupDescription></GroupDescription>Group -
The Microsoft SCOM Run As accounts must only use least access permissions.
<VulnDiscussion>The Microsoft SCOM privileged Run As accounts are used to execute work flow tasks on target endpoints. Run As Accounts are in...Rule Medium Severity -
SRG-APP-000033-NDM-000212
<GroupDescription></GroupDescription>Group -
The Microsoft SCOM administration console must only be installed on Management Servers and hardened Privileged Access Workstations.
<VulnDiscussion>The Microsoft SCOM management servers are considered high value IT resources where compromise would cause a significant impac...Rule Low Severity -
SRG-APP-000033-NDM-000212
<GroupDescription></GroupDescription>Group -
The Microsoft SCOM Service Accounts and Run As accounts must not be granted enterprise or domain level administrative privileges.
<VulnDiscussion>The Microsoft SCOM privileged Run As accounts are used to execute work flow tasks on target endpoints. A SCOM Run As account ...Rule High Severity -
SRG-APP-000033-NDM-000212
<GroupDescription></GroupDescription>Group -
SCOM SQL Management must be configured to use least privileges.
<VulnDiscussion>Microsoft SCOM's SQL management requires a Run as solution because the local system account will not have the required permis...Rule High Severity -
SRG-APP-000516-NDM-000340
<GroupDescription></GroupDescription>Group -
The Microsoft SCOM server must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
<VulnDiscussion>Protection of log data includes assuring log data is not accidentally lost or deleted. Regularly backing up audit records to ...Rule Medium Severity -
SRG-APP-000516-NDM-000351
<GroupDescription></GroupDescription>Group -
The Microsoft SCOM server must be running Windows operating system that supports modern security features such as virtualization based security.
<VulnDiscussion>Network devices running older but supported operating systems lack modern security features that mitigate attack surfaces. At...Rule High Severity -
SRG-APP-000516-NDM-000340
<GroupDescription></GroupDescription>Group -
SCOM unsealed management packs must be backed up regularly.
<VulnDiscussion>SCOM's configuration information is stored within unsealed management packs. Even without SQL backups, a catastrophic failure...Rule Low Severity -
SRG-APP-000516-NDM-000344
<GroupDescription></GroupDescription>Group -
If a certificate is used for the SCOM web console, this certificate must be generated by a DoD CA or CA approved by the organization.
<VulnDiscussion>Web certificates should always be signed by a trusted signer and never self-signed.</VulnDiscussion><FalsePositives&...Rule Low Severity -
SRG-APP-000395-NDM-000310
<GroupDescription></GroupDescription>Group -
The Microsoft SCOM SNMP Monitoring in SCOM must use SNMP V3.
<VulnDiscussion>SNMP Versions 1 and 2 do not use a FIPS-validated Keyed-Hash message Authentication Code (HMAC). SCOM has the capability of m...Rule Low Severity -
SRG-APP-000080-NDM-000345
<GroupDescription></GroupDescription>Group -
The Microsoft SCOM server must use an active directory group that contains authorized members of the SCOM Administrators Role Group.
<VulnDiscussion>During the initial installation, SCOM grants the Builtin\Administrators group administrator rights to the application. This c...Rule Medium Severity -
SRG-APP-000080-NDM-000345
<GroupDescription></GroupDescription>Group -
The default Builtin\Administrators group must be removed from the SCOM Administrators Role Group.
<VulnDiscussion>SCOM servers with default well-known operating system groups defined the SCOM Administrators Global Group may allow a local a...Rule Medium Severity -
SRG-APP-000412-NDM-000331
<GroupDescription></GroupDescription>Group -
All SCOM servers must be configured for FIPS 140-2 compliance.
<VulnDiscussion>Unapproved mechanisms used for authentication to the cryptographic module are not validated and therefore cannot be relied on...Rule High Severity -
SRG-APP-000435-NDM-000315
<GroupDescription></GroupDescription>Group -
A host-based firewall must be configured on the SCOM management servers.
<VulnDiscussion>To prevent a DDoS, a firewall that inspects and drops packets must be configured.</VulnDiscussion><FalsePositives>...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.