Skip to content

Microsoft Windows Server 2016 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The required legal notice must be configured to display before console logon.

    Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access to system resources. Satisfies: SRG-OS-000023-GPOS-00006, SRG-OS-00002...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • The Windows dialog box title for the legal banner must be configured with the appropriate text.

    Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access to system resources. Satisfies: SRG-OS-000023-GPOS-00006, SRG-OS-00022...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Smart Card removal option must be configured to Force Logoff or Lock Workstation.

    Unattended systems are susceptible to unauthorized use and must be locked. Configuring a system to lock when a smart card is removed will ensure the system is inaccessible when unattended.
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • The setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.

    The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB ...
    Rule Medium Severity
  • SRG-OS-000074-GPOS-00042

    Group
  • Unencrypted passwords must not be sent to third-party Server Message Block (SMB) servers.

    Some non-Microsoft SMB servers only support unencrypted (plain-text) password authentication. Sending plain-text passwords across the network when authenticating to an SMB server reduces the overal...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • The setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.

    The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB ...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • The setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.

    The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Anonymous SID/Name translation must not be allowed.

    Allowing anonymous SID/Name translation can provide sensitive information for accessing a system. Only authorized users must be able to perform such translations.
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Anonymous enumeration of Security Account Manager (SAM) accounts must not be allowed.

    Anonymous enumeration of SAM accounts allows anonymous logon users (null session connections) to list all accounts names, thus providing a list of potential points to attack the system.
    Rule High Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • Anonymous enumeration of shares must not be allowed.

    Allowing anonymous logon users (null session connections) to list all account names and enumerate all shared resources can provide a map of potential points to attack the system.
    Rule High Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • Anonymous access to Named Pipes and Shares must be restricted.

    Allowing anonymous access to named pipes or shares provides the potential for unauthorized system access. This setting restricts access to those defined in "Network access: Named Pipes that can be ...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.

    Services using Local System that use Negotiate when reverting to NTLM authentication may gain unauthorized access if allowed to authenticate anonymously versus using the computer identity.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • NTLM must be prevented from falling back to a Null session.

    NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • PKU2U authentication using online identities must be prevented.

    PKU2U is a peer-to-peer authentication protocol. This setting prevents online identities from authenticating to domain-joined systems. Authentication will be centrally managed with Windows user acc...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    Group
  • SRG-OS-000073-GPOS-00041

    Group
  • Windows Server 2016 must be configured to prevent the storage of the LAN Manager hash of passwords.

    The LAN Manager hash uses a weak encryption algorithm and there are several tools available that use this hash to retrieve account passwords. This setting controls whether a LAN Manager hash of the...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2016 must be configured to at least negotiate signing for LDAP client signing.

    This setting controls the signing requirements for LDAP clients. This must be set to "Negotiate signing" or "Require signing", depending on the environment and type of LDAP server in use.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.

    Microsoft has implemented a variety of security support providers for use with Remote Procedure Call (RPC) sessions. All of the options must be enabled to ensure the maximum security level.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.

    Microsoft has implemented a variety of security support providers for use with Remote Procedure Call (RPC) sessions. All of the options must be enabled to ensure the maximum security level.
    Rule Medium Severity
  • SRG-OS-000067-GPOS-00035

    Group
  • SRG-OS-000033-GPOS-00014

    Group
  • Windows Server 2016 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.

    This setting ensures the system uses algorithms that are FIPS-compliant for encryption, hashing, and signing. FIPS-compliant algorithms meet specific standards established by the U.S. Government an...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000373-GPOS-00157

    Group
  • User Account Control approval mode for the built-in Administrator must be enabled.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures the built-in Administrator...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting prevents User Interface Accessibility...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • User Account Control must, at a minimum, prompt administrators for consent on the secure desktop.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures the elevation requirements...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • User Account Control must automatically deny standard user requests for elevation.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting controls the behavior of elevation wh...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • User Account Control must be configured to detect application installations and prompt for elevation.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting requires Windows to respond to applic...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules