Skip to content

Microsoft Windows 10 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.

    <VulnDiscussion>Allowing ICMP redirect of routes can lead to traffic not being routed properly. When disabled, this forces ICMP to be route...
    Rule Low Severity
  • SRG-OS-000420-GPOS-00186

    <GroupDescription></GroupDescription>
    Group
  • Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.

    &lt;VulnDiscussion&gt;Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for Kerberos, pr...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • Secure Boot must be enabled on Windows 10 systems.

    &lt;VulnDiscussion&gt;Secure Boot is a standard that ensures systems boot only to a trusted operating system. Secure Boot is required to support ad...
    Rule Low Severity
  • SRG-OS-000191-GPOS-00080

    <GroupDescription></GroupDescription>
    Group
  • Data Execution Prevention (DEP) must be configured to at least OptOut.

    &lt;VulnDiscussion&gt;Attackers are constantly looking for vulnerabilities in systems and applications. Data Execution Prevention (DEP) prevents ha...
    Rule High Severity
  • SRG-OS-000433-GPOS-00192

    <GroupDescription></GroupDescription>
    Group
  • User Account Control must run all administrators in Admin Approval Mode, enabling UAC.

    &lt;VulnDiscussion&gt;User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative account...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    <GroupDescription></GroupDescription>
    Group
  • Structured Exception Handling Overwrite Protection (SEHOP) must be enabled.

    &lt;VulnDiscussion&gt;Attackers are constantly looking for vulnerabilities in systems and applications. Structured Exception Handling Overwrite Pro...
    Rule High Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The Windows PowerShell 2.0 feature must be disabled on the system.

    &lt;VulnDiscussion&gt;Windows PowerShell 5.0 added advanced logging features which can provide additional detail when malware has been run on a sys...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The maximum password age must be configured to 60 days or less.

    &lt;VulnDiscussion&gt;The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the passwords. Sch...
    Rule Medium Severity
  • SRG-OS-000075-GPOS-00043

    <GroupDescription></GroupDescription>
    Group
  • The minimum password age must be configured to at least 1 day.

    &lt;VulnDiscussion&gt;Permitting passwords to be changed in immediate succession within the same day allows users to cycle passwords through their ...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    <GroupDescription></GroupDescription>
    Group
  • Passwords must, at a minimum, be 14 characters.

    &lt;VulnDiscussion&gt;Information systems not protected with strong password schemes (including passwords of minimum length) provide the opportunit...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules