Microsoft Windows 10 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The built-in administrator account must be disabled.
<VulnDiscussion>The built-in administrator account is a well-known account subject to attack. It also provides no accountability to individu...Rule Medium Severity -
SRG-OS-000121-GPOS-00062
<GroupDescription></GroupDescription>Group -
The built-in guest account must be disabled.
<VulnDiscussion>A system faces an increased vulnerability threat if the built-in guest account is not disabled. This account is a known acco...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Local accounts with blank passwords must be restricted to prevent access from the network.
<VulnDiscussion>An account without a password can allow unauthorized access to a system as only the username would be required. Password pol...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Windows SMB client must be configured to always perform SMB packet signing.
<VulnDiscussion>The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in ...Rule Medium Severity -
The built-in guest account must be renamed.
<VulnDiscussion>The built-in guest account is a well-known user account on all Windows systems and, as initially installed, does not require ...Rule Medium Severity -
SRG-OS-000062-GPOS-00031
<GroupDescription></GroupDescription>Group -
Audit policy using subcategories must be enabled.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.