Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000317-NDM-000282

    Group
  • Members of the SCOM Administrators Group must be reviewed to ensure access is still required.

    When people leave their roles, their group memberships are often times not updated.
    Rule Medium Severity
  • SRG-APP-000033-NDM-000212

    Group
  • Manually configured SCOM Run As accounts must be set to More Secure distribution.

    The Microsoft SCOM privileged Run As accounts are used to execute work flow tasks on target endpoints. A SCOM Run As account creates an interactive log on session to perform its tasks. The interact...
    Rule High Severity
  • SRG-APP-000033-NDM-000212

    Group
  • SCOM Run As accounts used to manage Linux/UNIX endpoints must be configured for least privilege.

    The Microsoft SCOM privileged Run As accounts are used to execute work flow tasks on target endpoints. A SCOM Run As account must only have the level of privileges required to perform the defined S...
    Rule High Severity
  • SRG-APP-000033-NDM-000212

    Group
  • The Microsoft SCOM Agent Action Account must be a local system account.

    The SCOM agent action account is the account agent used to perform tasks on an individual machine. By default, the action agent account is the local system account, but this can be configured to ru...
    Rule Medium Severity
  • SRG-APP-000033-NDM-000212

    Group
  • The Microsoft SCOM Run As accounts must only use least access permissions.

    The Microsoft SCOM privileged Run As accounts are used to execute work flow tasks on target endpoints. Run As Accounts are interactive logon sessions on a system. An attacker who has compromised on...
    Rule Medium Severity
  • SRG-APP-000033-NDM-000212

    Group
  • The Microsoft SCOM administration console must only be installed on Management Servers and hardened Privileged Access Workstations.

    The Microsoft SCOM management servers are considered high value IT resources where compromise would cause a significant impact to the organization. The Operations Manager console contains APIs that...
    Rule Low Severity
  • SRG-APP-000033-NDM-000212

    Group
  • The Microsoft SCOM Service Accounts and Run As accounts must not be granted enterprise or domain level administrative privileges.

    The Microsoft SCOM privileged Run As accounts are used to execute work flow tasks on target endpoints. A SCOM Run As account must only have the level of privileges required to perform the defined S...
    Rule High Severity
  • SRG-APP-000033-NDM-000212

    Group
  • SCOM SQL Management must be configured to use least privileges.

    Microsoft SCOM's SQL management requires a Run as solution because the local system account will not have the required permissions to monitor SQL. If the Run As account is created with elevated da...
    Rule High Severity
  • SRG-APP-000516-NDM-000340

    Group
  • The Microsoft SCOM server must back up audit records at least every seven days onto a different system or system component than the system or component being audited.

    Protection of log data includes assuring log data is not accidentally lost or deleted. Regularly backing up audit records to a different system or onto separate media than the system being audited ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000351

    Group
  • The Microsoft SCOM server must be running Windows operating system that supports modern security features such as virtualization based security.

    Network devices running older but supported operating systems lack modern security features that mitigate attack surfaces. Attackers face a higher level of complexity to overcome during a compromis...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules