Microsoft Windows 10 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000042-GPOS-00020
<GroupDescription></GroupDescription>Group -
Command line data must be included in process creation events.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows 10 must be configured to enable Remote host allows delegation of non-exportable credentials.
<VulnDiscussion>An exportable version of credentials is provided to remote hosts when using credential delegation which exposes them to theft...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Virtualization Based Security must be enabled on Windows 10 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
<VulnDiscussion>Virtualization Based Security (VBS) provides the platform for the additional security features, Credential Guard and Virtuali...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Credential Guard must be running on Windows 10 domain-joined systems.
<VulnDiscussion>Credential Guard uses virtualization based security to protect information that could be used in credential theft attacks if ...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers.
<VulnDiscussion>By being launched first by the kernel, ELAM ( Early Launch Antimalware) is ensured to be launched before any third-party soft...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Group Policy objects must be reprocessed even if they have not changed.
<VulnDiscussion>Enabling this setting and then selecting the "Process even if the Group Policy objects have not changed" option ensures that ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Downloading print driver packages over HTTP must be prevented.
<VulnDiscussion>Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Web publishing and online ordering wizards must be prevented from downloading a list of providers.
<VulnDiscussion>Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Printing over HTTP must be prevented.
<VulnDiscussion>Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Systems must at least attempt device authentication using certificates.
<VulnDiscussion>Using certificates to authenticate devices to the domain provides increased security over passwords. By default systems will...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The network selection user interface (UI) must not be displayed on the logon screen.
<VulnDiscussion>Enabling interaction with the network selection UI allows users to change connections to available networks without signing i...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Local users on domain-joined computers must not be enumerated.
<VulnDiscussion>The username is one part of logon credentials that could be used to gain access to a system. Preventing the enumeration of us...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
Users must be prompted for a password on resume from sleep (on battery).
<VulnDiscussion>Authentication must always be required when accessing a system. This setting ensures the user is prompted for a password on r...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
The user must be prompted for a password on resume from sleep (plugged in).
<VulnDiscussion>Authentication must always be required when accessing a system. This setting ensures the user is prompted for a password on r...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
Solicited Remote Assistance must not be allowed.
<VulnDiscussion>Remote assistance allows another user to view or take control of the local session of a user. Solicited assistance is help t...Rule High Severity -
SRG-OS-000379-GPOS-00164
<GroupDescription></GroupDescription>Group -
Unauthenticated RPC clients must be restricted from connecting to the RPC server.
<VulnDiscussion>Configuring RPC to restrict unauthenticated RPC clients from connecting to the RPC server will prevent anonymous connections....Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The setting to allow Microsoft accounts to be optional for modern style apps must be enabled.
<VulnDiscussion>Control of credentials and the system must be maintained within the enterprise. Enabling this setting allows enterprise cred...Rule Low Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.
<VulnDiscussion>Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...Rule Low Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
Autoplay must be turned off for non-volume devices.
<VulnDiscussion>Allowing autoplay to execute may introduce malicious code to a system. Autoplay begins reading from a drive as soon as you i...Rule High Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
The default autorun behavior must be configured to prevent autorun commands.
<VulnDiscussion>Allowing autorun commands to execute may introduce malicious code to a system. Configuring this setting prevents autorun com...Rule High Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
Autoplay must be disabled for all drives.
<VulnDiscussion>Allowing autoplay to execute may introduce malicious code to a system. Autoplay begins reading from a drive as soon as you i...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Enhanced anti-spoofing for facial recognition must be enabled on Window 10.
<VulnDiscussion>Enhanced anti-spoofing provides additional protections when using facial recognition with devices that support it.</VulnDi...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Microsoft consumer experiences must be turned off.
<VulnDiscussion>Microsoft consumer experiences provides suggestions and notifications to users, which may include the installation of Windows...Rule Low Severity -
Administrator accounts must not be enumerated during elevation.
<VulnDiscussion>Enumeration of administrator accounts when elevating can provide part of the logon information to an unauthorized user. This...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
If Enhanced diagnostic data is enabled it must be limited to the minimum required to support Windows Analytics.
<VulnDiscussion>Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.