Microsoft Windows Server 2016 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not al...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
The setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not al...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
The setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the ch...Rule Medium Severity -
SRG-OS-000379-GPOS-00164
<GroupDescription></GroupDescription>Group -
The computer account password must not be prevented from being reset.
<VulnDiscussion>Computer account passwords are changed automatically on a regular basis. Disabling automatic password changes can make the sy...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The maximum age for machine account passwords must be configured to 30 days or less.
<VulnDiscussion>Computer account passwords are changed automatically on a regular basis. This setting controls the maximum password age that ...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to require a strong session key.
<VulnDiscussion>A computer connecting to a domain controller will establish a secure channel. The secure channel connection may be subject to...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
<GroupDescription></GroupDescription>Group -
The machine inactivity limit must be set to 15 minutes, locking the system with the screen saver.
<VulnDiscussion>Unattended systems are susceptible to unauthorized use and should be locked when unattended. The screen saver should be set a...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
The required legal notice must be configured to display before console logon.
<VulnDiscussion>Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
The Windows dialog box title for the legal banner must be configured with the appropriate text.
<VulnDiscussion>Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
<VulnDiscussion>Unattended systems are susceptible to unauthorized use and must be locked. Configuring a system to lock when a smart card is ...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.