Skip to content

Microsoft Windows 11 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000134-GPOS-00068

    Group
  • User Account Control must be configured to detect application installations and prompt for elevation.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting requires Windows to respond to applic...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • SRG-OS-000076-GPOS-00044

    Group
  • SRG-OS-000095-GPOS-00049

    Group
  • Toast notifications to the lock screen must be turned off.

    Toast notifications that are displayed on the lock screen could display sensitive information to unauthorized personnel. Turning off this feature will limit access to the information to a logged on...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Zone information must be preserved when saving attachments.

    Preserving zone of origin (internet, intranet, local, restricted) information on file attachments allows Windows to determine risk.
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Access Credential Manager as a trusted caller" user right must not be assigned to any groups or accounts.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access Credential Manager as a trusted caller" user right may be abl...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The "Access this computer from the network" user right must only be assigned to the Administrators and Remote Desktop Users groups.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access this computer from the network" user right may access resourc...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Profile single process" user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Profile single process" user right can monitor non-system processes ...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The "Allow log on locally" user right must only be assigned to the Administrators and Users groups.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Allow log on locally" user right can log on interactively to a system.
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Back up files and directories" user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Back up files and directories" user right can circumvent file and di...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Change the system time" user right must only be assigned to Administrators and Local Service.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Change the system time" user right can change the system time, which...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Create a pagefile" user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create a pagefile" user right can change the size of a pagefile, whi...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Create a token object" user right must not be assigned to any groups or accounts.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Create a token object" user right allows a process to create an access token. This...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • SRG-OS-000324-GPOS-00125

    Group
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Create permanent shared objects" user right must not be assigned to any groups or accounts.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create permanent shared objects" user right could expose sensitive d...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Create symbolic links" user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create symbolic links" user right can create pointers to other objec...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • The "Deny access to this computer from the network" user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny access to this computer from the network" right defines the accounts that are...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a batch job" right defines accounts that are prevented from logging...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • The "Deny log on through Remote Desktop Services" user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on through Remote Desktop Services" right defines the accounts that are p...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Force shutdown from a remote system" user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Force shutdown from a remote system" user right can remotely shut do...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Load and unload device drivers" user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Load and unload device drivers" user right allows device drivers to dynamically be...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Lock pages in memory" user right must not be assigned to any groups or accounts.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Lock pages in memory" user right allows physical memory to be assigned to processe...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • The "Manage auditing and security log" user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Manage auditing and security log" user right can manage the security...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules