Microsoft Windows 10 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
A host-based firewall must be installed and enabled on the system.
<VulnDiscussion>A firewall provides a line of defense against attack, allowing or blocking inbound and outbound connections based on a set of...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Bluetooth must be turned off when not in use.
<VulnDiscussion>If not configured properly, Bluetooth may allow rogue devices to communicate with a system. If a rogue device is paired with ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The system must notify the user when a Bluetooth device attempts to connect.
<VulnDiscussion>If not configured properly, Bluetooth may allow rogue devices to communicate with a system. If a rogue device is paired with ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
SRG-OS-000076-GPOS-00044
<GroupDescription></GroupDescription>Group -
The system must be configured to prevent IP source routing.
<VulnDiscussion>Configuring the system to disable IP source routing protects against spoofing.</VulnDiscussion><FalsePositives>&l...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Users must be prevented from changing installation options.
<VulnDiscussion>Installation options for applications are typically controlled by administrators. This setting prevents users from changing i...Rule Medium Severity -
SRG-OS-000362-GPOS-00149
<GroupDescription></GroupDescription>Group -
The Windows Remote Management (WinRM) service must not allow unencrypted traffic.
<VulnDiscussion>Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connectio...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
Turning off File Explorer heap termination on corruption must be disabled.
<VulnDiscussion>Legacy plug-in applications may continue to function when a File Explorer session has become corrupt. Disabling this feature...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Basic authentication for RSS feeds over HTTP must not be used.
<VulnDiscussion>Basic authentication uses plain text passwords that could be used to compromise a system.</VulnDiscussion><FalsePosi...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Indexing of encrypted files must be turned off.
<VulnDiscussion>Indexing of encrypted files may expose sensitive data. This setting prevents encrypted files from being indexed.</VulnDis...Rule Medium Severity -
SRG-OS-000362-GPOS-00149
<GroupDescription></GroupDescription>Group -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows 10 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
<VulnDiscussion>Credential Guard uses virtualization-based security to protect information that could be used in credential theft attacks if ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows 10 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
<VulnDiscussion>UEFI provides additional security features in comparison to legacy BIOS firmware, including Secure Boot. UEFI is required to ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows 10 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: Continuously, where ESS is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
<VulnDiscussion>An approved tool for continuous network scanning must be installed and configured to run. Without the use of automated mecha...Rule Medium Severity -
SRG-OS-000185-GPOS-00079
<GroupDescription></GroupDescription>Group -
Windows 10 information systems must use BitLocker to encrypt all disks to protect the confidentiality and integrity of all information at rest.
<VulnDiscussion>If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data acc...Rule High Severity -
SRG-OS-000185-GPOS-00079
<GroupDescription></GroupDescription>Group -
Windows 10 systems must use a BitLocker PIN for pre-boot authentication.
<VulnDiscussion>If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data acc...Rule High Severity -
SRG-OS-000185-GPOS-00079
<GroupDescription></GroupDescription>Group -
Windows 10 systems must use a BitLocker PIN with a minimum length of six digits for pre-boot authentication.
<VulnDiscussion>If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data acc...Rule High Severity -
SRG-OS-000370-GPOS-00155
<GroupDescription></GroupDescription>Group -
The operating system must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
<VulnDiscussion>Utilizing an allowlist provides a configuration management method for allowing the execution of only authorized software. Usi...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows 10 systems must be maintained at a supported servicing level.
<VulnDiscussion>Windows 10 is maintained by Microsoft at servicing levels for specific periods of time to support Windows as a Service. Syste...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Windows 10 system must use an anti-virus program.
<VulnDiscussion>Malicious software can establish a base on individual desktops and servers. Employing an automated mechanism to detect this t...Rule High Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
Local volumes must be formatted using NTFS.
<VulnDiscussion>The ability to set access permissions and auditing is critical to maintaining the security and proper access controls of a sy...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Alternate operating systems must not be permitted on the same system.
<VulnDiscussion>Allowing other operating systems to run on a secure system may allow security to be circumvented.</VulnDiscussion><F...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
Non system-created file shares on a system must limit access to groups that require it.
<VulnDiscussion>Shares which provide network access, should not typically exist on a workstation except for system-created administrative sha...Rule Medium Severity -
SRG-OS-000118-GPOS-00060
<GroupDescription></GroupDescription>Group -
Unused accounts must be disabled or removed from the system after 35 days of inactivity.
<VulnDiscussion>Outdated or unused accounts provide penetration points that may go undetected. Inactive accounts must be deleted if no longer...Rule Low Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
Internet Information System (IIS) or its subcomponents must not be installed on a workstation.
<VulnDiscussion>Installation of Internet Information System (IIS) may allow unauthorized internet services to be hosted. Websites must only ...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.