Microsoft Windows 10 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Only accounts responsible for the administration of a system must have Administrator rights on the system.
<VulnDiscussion>An account that does not have Administrator duties must not have Administrator rights. Such rights would allow the account t...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Only accounts responsible for the backup operations must be members of the Backup Operators group.
<VulnDiscussion>Backup Operators are able to read and write to any file in the system, regardless of the rights assigned to it. Backup and r...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Only authorized user accounts must be allowed to create or run virtual machines on Windows 10 systems.
<VulnDiscussion>Allowing other operating systems to run on a secure system may allow users to circumvent security. For Hyper-V, preventing un...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Standard local user accounts must not exist on a system in a domain.
<VulnDiscussion>To minimize potential points of attack, local user accounts, other than built-in accounts and local administrator accounts, m...Rule Low Severity -
SRG-OS-000076-GPOS-00044
<GroupDescription></GroupDescription>Group -
Accounts must be configured to require password expiration.
<VulnDiscussion>Passwords that do not expire increase exposure with a greater probability of being discovered or cracked.</VulnDiscussion&...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
<GroupDescription></GroupDescription>Group -
Permissions for system files and directories must conform to minimum requirements.
<VulnDiscussion>Changing the system's file and directory permissions allows the possibility of unauthorized and anonymous modification to the...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
SRG-OS-000096-GPOS-00050
<GroupDescription></GroupDescription>Group -
Inbound exceptions to the firewall on Windows 10 domain workstations must only allow authorized remote management hosts.
<VulnDiscussion>Allowing inbound access to domain workstations from other systems may allow lateral movement across systems if credentials ar...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
The Server Message Block (SMB) v1 protocol must be disabled on the system.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.