Skip to content

Microsoft Windows Server 2016 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Windows Server 2016 must be configured to audit System - System Integrity successes.

    <VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2016 must be configured to audit System - System Integrity failures.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The display of slide shows on the lock screen must be disabled.

    &lt;VulnDiscussion&gt;Slide shows that are displayed on the lock screen could display sensitive information to unauthorized personnel. Turning off ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • WDigest Authentication must be disabled on Windows Server 2016.

    &lt;VulnDiscussion&gt;When the WDigest Authentication protocol is enabled, plain-text passwords are stored in the Local Security Authority Subsyste...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.

    &lt;VulnDiscussion&gt;Configuring the system to disable IPv6 source routing protects against spoofing.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.

    &lt;VulnDiscussion&gt;Configuring the system to disable IP source routing protects against spoofing.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&l...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2016 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.

    &lt;VulnDiscussion&gt;Allowing ICMP redirect of routes can lead to traffic not being routed properly. When disabled, this forces ICMP to be routed ...
    Rule Low Severity
  • SRG-OS-000420-GPOS-00186

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2016 must be configured to ignore NetBIOS name release requests except from WINS servers.

    &lt;VulnDiscussion&gt;Configuring the system to ignore name release requests, except from WINS servers, prevents a denial of service (DoS) attack. ...
    Rule Low Severity
  • Hardened UNC paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.

    &lt;VulnDiscussion&gt;Additional security requirements are applied to Universal Naming Convention (UNC) paths specified in hardened UNC paths befor...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • Command line data must be included in process creation events.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2016 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.

    &lt;VulnDiscussion&gt;Virtualization-based security (VBS) provides the platform for the additional security features Credential Guard and virtualiz...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.

    &lt;VulnDiscussion&gt;Compromised boot drivers can introduce malware prior to protection mechanisms that load after initialization. The Early Launc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Group Policy objects must be reprocessed even if they have not changed.

    &lt;VulnDiscussion&gt;Registry entries for group policy settings can potentially be changed from the required configuration. This could occur as pa...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Downloading print driver packages over HTTP must be prevented.

    &lt;VulnDiscussion&gt;Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Administrator accounts must not be enumerated during elevation.

    &lt;VulnDiscussion&gt;Enumeration of administrator accounts when elevating can provide part of the logon information to an unauthorized user. This ...
    Rule Medium Severity
  • Printing over HTTP must be prevented.

    &lt;VulnDiscussion&gt;Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The network selection user interface (UI) must not be displayed on the logon screen.

    &lt;VulnDiscussion&gt;Enabling interaction with the network selection UI allows users to change connections to available networks without signing i...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Users must be prompted to authenticate when the system wakes from sleep (on battery).

    &lt;VulnDiscussion&gt;A system that does not require authentication when resuming from sleep may provide access to unauthorized users. Authenticati...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Users must be prompted to authenticate when the system wakes from sleep (plugged in).

    &lt;VulnDiscussion&gt;A system that does not require authentication when resuming from sleep may provide access to unauthorized users. Authenticati...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.

    &lt;VulnDiscussion&gt;Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...
    Rule Low Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • AutoPlay must be turned off for non-volume devices.

    &lt;VulnDiscussion&gt;Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon as media ...
    Rule High Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AutoPlay must be disabled for all drives.

    &lt;VulnDiscussion&gt;Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon media is ...
    Rule High Severity
  • Windows Telemetry must be configured to Security or Basic.

    &lt;VulnDiscussion&gt;Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • The Application event log size must be configured to 32768 KB or greater.

    &lt;VulnDiscussion&gt;Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and req...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • The Security event log size must be configured to 196608 KB or greater.

    &lt;VulnDiscussion&gt;Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and req...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • The System event log size must be configured to 32768 KB or greater.

    &lt;VulnDiscussion&gt;Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and req...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules