Microsoft Windows 11 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
The Windows Remote Management (WinRM) service must not use Basic authentication.
<VulnDiscussion>Basic authentication uses plain text passwords that could be used to compromise a system.</VulnDiscussion><FalsePosi...Rule High Severity -
SRG-OS-000394-GPOS-00174
<GroupDescription></GroupDescription>Group -
Windows 11 must be configured to prevent Windows apps from being activated by voice while the system is locked.
<VulnDiscussion>Allowing Windows apps to be activated by voice from the lock screen could allow for unauthorized use. Requiring logon will en...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The convenience PIN for Windows 11 must be disabled.
<VulnDiscussion>This policy controls whether a domain user can sign in using a convenience PIN to prevent enabling (Password Stuffer).</Vu...Rule Medium Severity -
SRG-OS-000031-GPOS-00012
<GroupDescription></GroupDescription>Group -
Windows Ink Workspace must be configured to disallow access above the lock.
<VulnDiscussion>This action secures Windows Ink, which contains applications and features oriented toward pen computing.</VulnDiscussion&g...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows 11 must be configured to prevent users from receiving suggestions for third-party or additional applications.
<VulnDiscussion>Windows spotlight features may suggest apps and content from third-party software publishers in addition to Microsoft apps an...Rule Low Severity -
SRG-OS-000471-GPOS-00216
<GroupDescription></GroupDescription>Group -
Windows 11 Kernel (Direct Memory Access) DMA Protection must be enabled.
<VulnDiscussion>Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The DoD Root CA certificates must be installed in the Trusted Root Store.
<VulnDiscussion>To ensure secure DoD websites and DoD-signed code are properly validated, the system must trust the DoD Root Certificate Auth...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The External Root CA certificates must be installed in the Trusted Root Store on unclassified systems.
<VulnDiscussion>To ensure secure websites protected with External Certificate Authority (ECA) server certificates are properly validated, the...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The DoD Interoperability Root CA cross-certificates must be installed in the Untrusted Certificates Store on unclassified systems.
<VulnDiscussion>To ensure users do not experience denial of service when performing certificate-based authentication to DoD websites due to t...Rule Medium Severity -
SRG-OS-000403-GPOS-00182
<GroupDescription></GroupDescription>Group -
The US DoD CCEB Interoperability Root CA cross-certificates must be installed in the Untrusted Certificates Store on unclassified systems.
<VulnDiscussion>To ensure users do not experience denial of service when performing certificate-based authentication to DoD websites due to t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained.
<VulnDiscussion>The registry is integral to the function, security, and stability of the Windows system. Changing the system's registry permi...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
The built-in administrator account must be disabled.
<VulnDiscussion>The built-in administrator account is a well-known account subject to attack. It also provides no accountability to individua...Rule Medium Severity -
SRG-OS-000121-GPOS-00062
<GroupDescription></GroupDescription>Group -
The built-in guest account must be disabled.
<VulnDiscussion>A system faces an increased vulnerability threat if the built-in guest account is not disabled. This account is a known accou...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Local accounts with blank passwords must be restricted to prevent access from the network.
<VulnDiscussion>An account without a password can allow unauthorized access to a system as only the username would be required. Password poli...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The built-in guest account must be renamed.
<VulnDiscussion>The built-in guest account is a well-known user account on all Windows systems and, as initially installed, does not require ...Rule Medium Severity -
SRG-OS-000062-GPOS-00031
<GroupDescription></GroupDescription>Group -
Audit policy using subcategories must be enabled.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Outgoing secure channel traffic must be encrypted or signed.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not al...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Outgoing secure channel traffic must be encrypted.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not al...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Outgoing secure channel traffic must be signed.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the ch...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The computer account password must not be prevented from being reset.
<VulnDiscussion>Computer account passwords are changed automatically on a regular basis. Disabling automatic password changes can make the sy...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The maximum age for machine account passwords must be configured to 30 days or less.
<VulnDiscussion>Computer account passwords are changed automatically on a regular basis. This setting controls the maximum password age that ...Rule Low Severity -
The machine inactivity limit must be set to 15 minutes, locking the system with the screensaver.
<VulnDiscussion>Unattended systems are susceptible to unauthorized use and must be locked when unattended. The screen saver must be set at a ...Rule Medium Severity -
SRG-OS-000024-GPOS-00007
<GroupDescription></GroupDescription>Group -
The required legal notice must be configured to display before console logon.
<VulnDiscussion>Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access...Rule Medium Severity -
SRG-OS-000228-GPOS-00088
<GroupDescription></GroupDescription>Group -
The Windows message title for the legal notice must be configured.
<VulnDiscussion>Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Caching of logon credentials must be limited.
<VulnDiscussion>The default Windows configuration caches the last logon credentials for users who log on interactively to a system. This feat...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.