Skip to content

Microsoft Windows 10 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The Secondary Logon service must be disabled on Windows 10.

    &lt;VulnDiscussion&gt;The Secondary Logon service provides a means for entering alternate credentials, typically used to run commands with elevated...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Orphaned security identifiers (SIDs) must be removed from user rights on Windows 10.

    &lt;VulnDiscussion&gt;Accounts or groups given rights on a system may show up as unresolved SIDs for various reasons including deletion of the acco...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Bluetooth must be turned off unless approved by the organization.

    &lt;VulnDiscussion&gt;If not configured properly, Bluetooth may allow rogue devices to communicate with a system. If a rogue device is paired with ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.

    &lt;VulnDiscussion&gt;Using applications that access the Internet or have potential Internet sources using administrative privileges exposes a syst...
    Rule High Severity
  • SRG-OS-000185-GPOS-00079

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 nonpersistent VM sessions must not exceed 24 hours.

    &lt;VulnDiscussion&gt;For virtual desktop implementations (VDIs) where the virtual desktop instance is deleted or refreshed upon logoff, the organi...
    Rule Medium Severity
  • SRG-OS-000329-GPOS-00128

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 account lockout duration must be configured to 15 minutes or greater.

    &lt;VulnDiscussion&gt;The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies th...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The number of allowed bad logon attempts must be configured to 3 or less.

    &lt;VulnDiscussion&gt;The account lockout feature, when enabled, prevents brute-force password attacks on the system. The higher this value is, th...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The period of time before the bad logon counter is reset must be configured to 15 minutes.

    &lt;VulnDiscussion&gt;The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the...
    Rule Medium Severity
  • SRG-OS-000077-GPOS-00045

    <GroupDescription></GroupDescription>
    Group
  • The password history must be configured to 24 passwords remembered.

    &lt;VulnDiscussion&gt;A system is more vulnerable to unauthorized access when system users recycle the same password several times without being re...
    Rule Medium Severity
  • The system must be configured to audit Account Logon - Credential Validation failures.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000470-GPOS-00214

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules