Skip to content

Microsoft Windows Server 2016 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Windows Server 2016 Windows SmartScreen must be enabled.

    <VulnDiscussion>Windows SmartScreen helps protect systems from programs downloaded from the internet that may be malicious. Enabling SmartScr...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00192

    <GroupDescription></GroupDescription>
    Group
  • Explorer Data Execution Prevention must be enabled.

    &lt;VulnDiscussion&gt;Data Execution Prevention provides additional protection by performing checks on memory to help prevent malicious code from r...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Turning off File Explorer heap termination on corruption must be disabled.

    &lt;VulnDiscussion&gt;Legacy plug-in applications may continue to function when a File Explorer session has become corrupt. Disabling this feature ...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • File Explorer shell protocol must run in protected mode.

    &lt;VulnDiscussion&gt;The shell protocol will limit the set of folders that applications can open when run in protected mode. Restricting files an ...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    <GroupDescription></GroupDescription>
    Group
  • Passwords must not be saved in the Remote Desktop Client.

    &lt;VulnDiscussion&gt;Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to anoth...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • Local drives must be prevented from sharing with Remote Desktop Session Hosts.

    &lt;VulnDiscussion&gt;Preventing users from sharing the local drives on their client computers with Remote Session Hosts that they access helps red...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    <GroupDescription></GroupDescription>
    Group
  • Remote Desktop Services must always prompt a client for passwords upon connection.

    &lt;VulnDiscussion&gt;This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Disa...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • The Remote Desktop Session Host must require secure Remote Procedure Call (RPC) communications.

    &lt;VulnDiscussion&gt;Allowing unsecure RPC communication exposes the system to man-in-the-middle attacks and data disclosure attacks. A man-in-the...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • Remote Desktop Services must be configured with the client connection encryption set to High Level.

    &lt;VulnDiscussion&gt;Remote connections must be encrypted to prevent interception of data or sensitive information. Selecting "High Level" will en...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Attachments must be prevented from being downloaded from RSS feeds.

    &lt;VulnDiscussion&gt;Attachments from RSS feeds may not be secure. This setting will prevent attachments from being downloaded from RSS feeds.&lt;...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The Windows Installer Always install with elevated privileges option must be disabled.

    &lt;VulnDiscussion&gt;Standard user accounts must not be granted elevated privileges. Enabling Windows Installer to elevate privileges when install...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Users must be notified if a web-based program attempts to install software.

    &lt;VulnDiscussion&gt;Web-based programs may attempt to install malicious software on a system. Ensuring users are notified if a web-based program ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • Automatically signing in the last interactive user after a system-initiated restart must be disabled.

    &lt;VulnDiscussion&gt;Windows can be configured to automatically sign the user back in after a Windows Update restart. Some protections are in plac...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • PowerShell script block logging must be enabled.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000125-GPOS-00065

    <GroupDescription></GroupDescription>
    Group
  • The Windows Remote Management (WinRM) client must not use Basic authentication.

    &lt;VulnDiscussion&gt;Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will...
    Rule High Severity
  • SRG-OS-000393-GPOS-00173

    <GroupDescription></GroupDescription>
    Group
  • The Windows Remote Management (WinRM) client must not allow unencrypted traffic.

    &lt;VulnDiscussion&gt;Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connection...
    Rule Medium Severity
  • SRG-OS-000125-GPOS-00065

    <GroupDescription></GroupDescription>
    Group
  • The Windows Remote Management (WinRM) client must not use Digest authentication.

    &lt;VulnDiscussion&gt;Digest authentication is not as strong as other options and may be subject to man-in-the-middle attacks. Disallowing Digest a...
    Rule Medium Severity
  • The Windows Remote Management (WinRM) service must not allow unencrypted traffic.

    &lt;VulnDiscussion&gt;Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connection...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    <GroupDescription></GroupDescription>
    Group
  • The Windows Remote Management (WinRM) service must not store RunAs credentials.

    &lt;VulnDiscussion&gt;Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Windo...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • Only administrators responsible for the domain controller must have Administrator rights on the system.

    &lt;VulnDiscussion&gt;An account that does not have Administrator duties must not have Administrator rights. Such rights would allow the account to...
    Rule High Severity
  • SRG-OS-000112-GPOS-00057

    <GroupDescription></GroupDescription>
    Group
  • Kerberos user logon restrictions must be enforced.

    &lt;VulnDiscussion&gt;This policy setting determines whether the Kerberos Key Distribution Center (KDC) validates every request for a session ticke...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    <GroupDescription></GroupDescription>
    Group
  • The Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.

    &lt;VulnDiscussion&gt;This setting determines the maximum amount of time (in minutes) that a granted session ticket can be used to access a particu...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    <GroupDescription></GroupDescription>
    Group
  • The Kerberos user ticket lifetime must be limited to 10 hours or less.

    &lt;VulnDiscussion&gt;In Kerberos, there are two types of tickets: Ticket Granting Tickets (TGTs) and Service Tickets. Kerberos tickets have a limi...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    <GroupDescription></GroupDescription>
    Group
  • The Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.

    &lt;VulnDiscussion&gt;This setting determines the period of time (in days) during which a user's Ticket Granting Ticket (TGT) may be renewed. This ...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    <GroupDescription></GroupDescription>
    Group
  • The computer clock synchronization tolerance must be limited to 5 minutes or less.

    &lt;VulnDiscussion&gt;This setting determines the maximum time difference (in minutes) that Kerberos will tolerate between the time on a client's c...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • Permissions on the Active Directory data files must only allow System and Administrators access.

    &lt;VulnDiscussion&gt;Improper access permissions for directory data-related files could allow unauthorized users to read, modify, or delete direct...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules