Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000276

    Group
  • Microsoft Defender AV spyware definition age must not exceed 7 days.

    This policy setting allows defining the number of days that must pass before spyware definitions are considered out of date. If definitions are determined to be out of date, this state may trigger ...
    Rule High Severity
  • SRG-APP-000276

    Group
  • Microsoft Defender AV virus definition age must not exceed 7 days.

    This policy setting allows defining the number of days that must pass before virus definitions are considered out of date. If definitions are determined to be out of date, this state may trigger se...
    Rule High Severity
  • SRG-APP-000261

    Group
  • Microsoft Defender AV must be configured to check for definition updates daily.

    This policy setting allows specifying the day of the week on which to check for definition updates. The check can also be configured to run every day or to never run at all. This setting can be con...
    Rule Medium Severity
  • SRG-APP-000207

    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Severe.

    This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level. Threat alert levels should be added under the Options for this setting....
    Rule Medium Severity
  • SRG-APP-000210

    Group
  • Microsoft Defender AV must be configured to block executable content from email client and webmail.

    This rule blocks the following file types from being run or launched from an email seen in either Microsoft Outlook or webmail (such as Gmail.com or Outlook.com): Executable files (such as .exe, .d...
    Rule Medium Severity
  • SRG-APP-000210

    Group
  • Microsoft Defender AV must be configured block Office applications from creating child processes.

    Office apps, such as Word or Excel, will not be allowed to create child processes. This is a typical malware behavior, especially for macro-based attacks that attempt to use Office apps to launch o...
    Rule Medium Severity
  • SRG-APP-000210

    Group
  • Microsoft Defender AV must be configured block Office applications from creating executable content.

    This rule targets typical behaviors used by suspicious and malicious add-ons and scripts (extensions) that create or launch executable files. This is a typical malware technique. Extensions will be...
    Rule Medium Severity
  • SRG-APP-000210

    Group
  • Microsoft Defender AV must be configured to block Office applications from injecting into other processes.

    Office apps, such as Word, Excel, or PowerPoint, will not be able to inject code into other processes. This is typically used by malware to run malicious code in an attempt to hide the activity fro...
    Rule Medium Severity
  • SRG-APP-000210

    Group
  • Microsoft Defender AV must be configured to impede JavaScript and VBScript to launch executables.

    JavaScript and VBScript scripts can be used by malware to launch other malicious apps. This rule prevents these scripts from being allowed to launch apps, thus preventing malicious use of the scrip...
    Rule Medium Severity
  • SRG-APP-000210

    Group
  • Microsoft Defender AV must be configured to block execution of potentially obfuscated scripts.

    Malware and other threats can attempt to obfuscate or hide their malicious code in some script files. This rule prevents scripts that appear to be obfuscated from running. It uses the AntiMalwareSc...
    Rule Medium Severity
  • SRG-APP-000210

    Group
  • Microsoft Defender AV must be configured to block Win32 imports from macro code in Office.

    This rule blocks potentially malicious behavior by not allowing macro code to execute routines in the Win 32 dynamic link library (DLL).
    Rule Medium Severity
  • SRG-APP-000210

    Group
  • Microsoft Defender AV must be configured to prevent user and apps from accessing dangerous websites.

    Enable Microsoft Defender Exploit Guard network protection to prevent employees from using any application to access dangerous domains that may host phishing scams, exploit-hosting sites, and other...
    Rule Medium Severity
  • SRG-APP-000207

    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level High.

    This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level. Threat alert levels should be added under the Options for this setting....
    Rule Medium Severity
  • SRG-APP-000207

    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Medium.

    This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level. Threat alert levels should be added under the Options for this setting....
    Rule Medium Severity
  • SRG-APP-000207

    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Low.

    This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level. Threat alert levels should be added under the Options for this setting....
    Rule Medium Severity
  • SRG-APP-000279

    Group
  • Microsoft Defender AV must be configured to block the Potentially Unwanted Application (PUA) feature.

    After enabling this feature, PUA protection blocking takes effect on endpoint clients after the next signature update or computer restart. Signature updates take place daily under typical circumsta...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules