Microsoft Windows Server 2016 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The TFTP Client must not be installed.
<VulnDiscussion>Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authe...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Server Message Block (SMB) v1 protocol must be uninstalled.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Windows Remote Management (WinRM) service must not use Basic authentication.
<VulnDiscussion>Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will...Rule High Severity -
SRG-OS-000393-GPOS-00173
<GroupDescription></GroupDescription>Group -
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
Insecure logons to an SMB server must be disabled.
<VulnDiscussion>Insecure guest logons allow unauthenticated access to shared folders. Shared resources on a system must require authenticatio...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The default AutoRun behavior must be configured to prevent AutoRun commands.
<VulnDiscussion>Allowing AutoRun commands to execute may introduce malicious code to a system. Configuring this setting prevents AutoRun comm...Rule High Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
Basic authentication for RSS feeds over HTTP must not be used.
<VulnDiscussion>Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Indexing of encrypted files must be turned off.
<VulnDiscussion>Indexing of encrypted files may expose sensitive data. This setting prevents encrypted files from being indexed.</VulnDisc...Rule Medium Severity -
SRG-OS-000362-GPOS-00149
<GroupDescription></GroupDescription>Group -
The Telnet Client must not be installed.
<VulnDiscussion>Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authe...Rule Medium Severity -
Manually managed application account passwords must be at least 14 characters in length.
<VulnDiscussion>Application/service account passwords must be of sufficient length to prevent being easily cracked. Application/service accou...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
SRG-OS-000096-GPOS-00050
<GroupDescription></GroupDescription>Group -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
<VulnDiscussion>Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently int...Rule High Severity -
SRG-OS-000076-GPOS-00044
<GroupDescription></GroupDescription>Group -
Passwords for the built-in Administrator account must be changed at least every 60 days.
<VulnDiscussion>The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the password. The ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
<VulnDiscussion>Using applications that access the Internet or have potential Internet sources using administrative privileges exposes a syst...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
<VulnDiscussion>Backup Operators are able to read and write to any file in the system, regardless of the rights assigned to it. Backup and re...Rule Medium Severity -
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
Manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
<VulnDiscussion>Setting application account passwords to expire may cause applications to stop functioning. However, not changing them on a r...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
Shared user accounts must not be permitted on the system.
<VulnDiscussion>Shared accounts (accounts where two or more people log on with the same user identification) do not provide adequate identifi...Rule Medium Severity -
SRG-OS-000370-GPOS-00155
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
<VulnDiscussion>Using an allowlist provides a configuration management method to allow the execution of only authorized software. Using only ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2016 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
<VulnDiscussion>Credential Guard uses virtualization-based security to protect data that could be used in credential theft attacks if comprom...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Systems must be maintained at a supported servicing level.
<VulnDiscussion>Systems at unsupported servicing levels will not receive security updates for new vulnerabilities, which leave them subject t...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Windows Server 2016 system must use an anti-virus program.
<VulnDiscussion>Malicious software can establish a base on individual desktops and servers. Employing an automated mechanism to detect this t...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Servers must have a host-based intrusion detection or prevention system.
<VulnDiscussion>A properly configured Host-based Intrusion Detection System (HIDS) or Host-based Intrusion Prevention System (HIPS) provides ...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
Local volumes must use a format that supports NTFS attributes.
<VulnDiscussion>The ability to set access permissions and auditing is critical to maintaining the security and proper access controls of a sy...Rule High Severity -
SRG-OS-000312-GPOS-00122
<GroupDescription></GroupDescription>Group -
Permissions for the system drive root directory (usually C:\) must conform to minimum requirements.
<VulnDiscussion>Changing the system's file and directory permissions allows the possibility of unauthorized and anonymous modification to the...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.