Skip to content

Microsoft Windows 11 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000134-GPOS-00068

    <GroupDescription></GroupDescription>
    Group
  • Administrator accounts must not be enumerated during elevation.

    &lt;VulnDiscussion&gt;Enumeration of administrator accounts when elevating can provide part of the logon information to an unauthorized user. This ...
    Rule Medium Severity
  • Enhanced diagnostic data must be limited to the minimum required to support Windows Analytics.

    &lt;VulnDiscussion&gt;Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...
    Rule Medium Severity
  • SRG-OS-000205-GPOS-00083

    <GroupDescription></GroupDescription>
    Group
  • Windows Telemetry must not be configured to Full.

    &lt;VulnDiscussion&gt;Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Update must not obtain updates from other PCs on the internet.

    &lt;VulnDiscussion&gt;Windows 11 allows Windows Update to obtain updates from additional sources instead of Microsoft. In addition to Microsoft, up...
    Rule Low Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The Microsoft Defender SmartScreen for Explorer must be enabled.

    &lt;VulnDiscussion&gt;Microsoft Defender SmartScreen helps protect systems from programs downloaded from the internet that may be malicious. Enabli...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00192

    <GroupDescription></GroupDescription>
    Group
  • Explorer Data Execution Prevention must be enabled.

    &lt;VulnDiscussion&gt;Data Execution Prevention (DEP) provides additional protection by performing checks on memory to help prevent malicious code ...
    Rule Medium Severity
  • SRG-OS-000420-GPOS-00186

    <GroupDescription></GroupDescription>
    Group
  • File Explorer heap termination on corruption must be disabled.

    &lt;VulnDiscussion&gt;Legacy plug-in applications may continue to function when a File Explorer session has become corrupt. Disabling this feature ...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows 11 must be configured to disable Windows Game Recording and Broadcasting.

    &lt;VulnDiscussion&gt;Windows Game Recording and Broadcasting is intended for use with games; however, it could potentially record screen shots of ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The use of a hardware security device with Windows Hello for Business must be enabled.

    &lt;VulnDiscussion&gt;The use of a Trusted Platform Module (TPM) to store keys for Windows Hello for Business provides additional security. Keys st...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows 11 must be configured to require a minimum pin length of six characters or greater.

    &lt;VulnDiscussion&gt;Windows allows the use of PINs as well as biometrics for authentication without sending a password to a network or website wh...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • Passwords must not be saved in the Remote Desktop Client.

    &lt;VulnDiscussion&gt;Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to anoth...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • Local drives must be prevented from sharing with Remote Desktop Session Hosts.

    &lt;VulnDiscussion&gt;Preventing users from sharing the local drives on their client computers to Remote Session Hosts that they access helps reduc...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • Remote Desktop Services must always prompt a client for passwords upon connection.

    &lt;VulnDiscussion&gt;This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Disa...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • The Remote Desktop Session Host must require secure RPC communications.

    &lt;VulnDiscussion&gt;Allowing unsecure RPC communication exposes the system to man in the middle attacks and data disclosure attacks. A man in the...
    Rule Medium Severity
  • Remote Desktop Services must be configured with the client connection encryption set to the required level.

    &lt;VulnDiscussion&gt;Remote connections must be encrypted to prevent interception of data or sensitive information. Selecting "High Level" will en...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Attachments must be prevented from being downloaded from RSS feeds.

    &lt;VulnDiscussion&gt;Attachments from RSS feeds may not be secure. This setting will prevent attachments from being downloaded from RSS feeds.&lt;...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Basic authentication for RSS feeds over HTTP must not be used.

    &lt;VulnDiscussion&gt;Basic authentication uses plain text passwords that could be used to compromise a system.&lt;/VulnDiscussion&gt;&lt;FalsePosi...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Indexing of encrypted files must be turned off.

    &lt;VulnDiscussion&gt;Indexing of encrypted files may expose sensitive data. This setting prevents encrypted files from being indexed.&lt;/VulnDisc...
    Rule Medium Severity
  • SRG-OS-000362-GPOS-00149

    <GroupDescription></GroupDescription>
    Group
  • Users must be prevented from changing installation options.

    &lt;VulnDiscussion&gt;Installation options for applications are typically controlled by administrators. This setting prevents users from changing i...
    Rule Medium Severity
  • SRG-OS-000362-GPOS-00149

    <GroupDescription></GroupDescription>
    Group
  • The Windows Installer feature "Always install with elevated privileges" must be disabled.

    &lt;VulnDiscussion&gt;Standard user accounts must not be granted elevated privileges. Enabling Windows Installer to elevate privileges when install...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Users must be notified if a web-based program attempts to install software.

    &lt;VulnDiscussion&gt;Web-based programs may attempt to install malicious software on a system. Ensuring users are notified if a web-based program ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • Automatically signing in the last interactive user after a system-initiated restart must be disabled.

    &lt;VulnDiscussion&gt;Windows can be configured to automatically sign the user back in after a Windows Update restart. Some protections are in plac...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • PowerShell script block logging must be enabled on Windows 11.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000041-GPOS-00019

    <GroupDescription></GroupDescription>
    Group
  • PowerShell Transcription must be enabled on Windows 11.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000125-GPOS-00065

    <GroupDescription></GroupDescription>
    Group
  • The Windows Remote Management (WinRM) client must not use Basic authentication.

    &lt;VulnDiscussion&gt;Basic authentication uses plain text passwords that could be used to compromise a system.&lt;/VulnDiscussion&gt;&lt;FalsePosi...
    Rule High Severity
  • SRG-OS-000393-GPOS-00173

    <GroupDescription></GroupDescription>
    Group
  • The Windows Remote Management (WinRM) client must not allow unencrypted traffic.

    &lt;VulnDiscussion&gt;Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connection...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules