Microsoft Windows 11 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000134-GPOS-00068
Group -
User Account Control must be configured to detect application installations and prompt for elevation.
User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting requires Windows to respond to applic...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
Group -
SRG-OS-000076-GPOS-00044
Group -
SRG-OS-000095-GPOS-00049
Group -
Toast notifications to the lock screen must be turned off.
Toast notifications that are displayed on the lock screen could display sensitive information to unauthorized personnel. Turning off this feature will limit access to the information to a logged on...Rule Low Severity -
SRG-OS-000480-GPOS-00227
Group -
Zone information must be preserved when saving attachments.
Preserving zone of origin (internet, intranet, local, restricted) information on file attachments allows Windows to determine risk.Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
The "Access Credential Manager as a trusted caller" user right must not be assigned to any groups or accounts.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access Credential Manager as a trusted caller" user right may be abl...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
The "Access this computer from the network" user right must only be assigned to the Administrators and Remote Desktop Users groups.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access this computer from the network" user right may access resourc...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
The "Profile single process" user right must only be assigned to the Administrators group.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Profile single process" user right can monitor non-system processes ...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
The "Allow log on locally" user right must only be assigned to the Administrators and Users groups.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Allow log on locally" user right can log on interactively to a system.Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
The "Back up files and directories" user right must only be assigned to the Administrators group.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Back up files and directories" user right can circumvent file and di...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
The "Change the system time" user right must only be assigned to Administrators and Local Service.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Change the system time" user right can change the system time, which...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
The "Create a pagefile" user right must only be assigned to the Administrators group.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create a pagefile" user right can change the size of a pagefile, whi...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
The "Create a token object" user right must not be assigned to any groups or accounts.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Create a token object" user right allows a process to create an access token. This...Rule High Severity -
SRG-OS-000324-GPOS-00125
Group -
SRG-OS-000324-GPOS-00125
Group -
SRG-OS-000324-GPOS-00125
Group -
The "Create permanent shared objects" user right must not be assigned to any groups or accounts.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create permanent shared objects" user right could expose sensitive d...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
The "Create symbolic links" user right must only be assigned to the Administrators group.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create symbolic links" user right can create pointers to other objec...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
SRG-OS-000080-GPOS-00048
Group -
The "Deny access to this computer from the network" user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny access to this computer from the network" right defines the accounts that are...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a batch job" right defines accounts that are prevented from logging...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
SRG-OS-000080-GPOS-00048
Group -
SRG-OS-000080-GPOS-00048
Group -
The "Deny log on through Remote Desktop Services" user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on through Remote Desktop Services" right defines the accounts that are p...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
SRG-OS-000324-GPOS-00125
Group -
The "Force shutdown from a remote system" user right must only be assigned to the Administrators group.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Force shutdown from a remote system" user right can remotely shut do...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
SRG-OS-000324-GPOS-00125
Group -
The "Load and unload device drivers" user right must only be assigned to the Administrators group.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Load and unload device drivers" user right allows device drivers to dynamically be...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
The "Lock pages in memory" user right must not be assigned to any groups or accounts.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Lock pages in memory" user right allows physical memory to be assigned to processe...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The "Manage auditing and security log" user right must only be assigned to the Administrators group.
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Manage auditing and security log" user right can manage the security...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.