Skip to content

Microsoft Windows 10 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The built-in Microsoft password complexity filter must be enabled.

    <VulnDiscussion>The use of complex passwords increases their strength against guessing and brute-force attacks. This setting configures the ...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • Reversible password encryption must be disabled.

    &lt;VulnDiscussion&gt;Storing passwords using reversible encryption is essentially the same as storing clear-text versions of the passwords. For th...
    Rule High Severity
  • SRG-OS-000470-GPOS-00214

    <GroupDescription></GroupDescription>
    Group
  • Remote calls to the Security Account Manager (SAM) must be restricted to Administrators.

    &lt;VulnDiscussion&gt;The Windows Security Account Manager (SAM) stores users' passwords. Restricting remote rpc connections to the SAM to Adminis...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • NTLM must be prevented from falling back to a Null session.

    &lt;VulnDiscussion&gt;NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access.&lt;/VulnDiscussi...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • PKU2U authentication using online identities must be prevented.

    &lt;VulnDiscussion&gt;PKU2U is a peer-to-peer authentication protocol. This setting prevents online identities from authenticating to domain-join...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    <GroupDescription></GroupDescription>
    Group
  • The Windows Remote Management (WinRM) service must not store RunAs credentials.

    &lt;VulnDiscussion&gt;Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Windo...
    Rule Medium Severity
  • SRG-OS-000125-GPOS-00065

    <GroupDescription></GroupDescription>
    Group
  • The Windows Remote Management (WinRM) client must not use Digest authentication.

    &lt;VulnDiscussion&gt;Digest authentication is not as strong as other options and may be subject to man-in-the-middle attacks.&lt;/VulnDiscussion&g...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    <GroupDescription></GroupDescription>
    Group
  • File Explorer shell protocol must run in protected mode.

    &lt;VulnDiscussion&gt;The shell protocol will limit the set of folders applications can open when run in protected mode. Restricting files an app...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The built-in administrator account must be renamed.

    &lt;VulnDiscussion&gt;The built-in administrator account is a well-known account subject to attack. Renaming this account to an unidentified name ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000074-GPOS-00042

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000373-GPOS-00157

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules