Skip to content

Microsoft Windows Server 2016 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000095-GPOS-00049

    Group
  • SRG-OS-000095-GPOS-00049

    Group
  • The Server Message Block (SMB) v1 protocol must be uninstalled.

    SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks and is not FIPS compliant.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.

    SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks as well as not being FIPS compliant.
    Rule Medium Severity
  • SRG-OS-000393-GPOS-00173

    Group
  • Passwords for the built-in Administrator account must be changed at least every 60 days.

    The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the password. The built-in Administrator account is not generally used and its password no...
    Rule Medium Severity
  • Manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.

    Setting application account passwords to expire may cause applications to stop functioning. However, not changing them on a regular basis exposes them to attack. If managed service accounts are use...
    Rule Medium Severity
  • Windows Server 2016 must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.

    Using an allowlist provides a configuration management method to allow the execution of only authorized software. Using only authorized software decreases risk by limiting the number of potential v...
    Rule Medium Severity
  • Servers must have a host-based intrusion detection or prevention system.

    A properly configured Host-based Intrusion Detection System (HIDS) or Host-based Intrusion Prevention System (HIPS) provides another level of defense against unauthorized access to critical servers...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules