No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000121
<GroupDescription></GroupDescription>Group -
The Anonymous Logon and Everyone groups must not be members of the Pre-Windows 2000 Compatible Access group.
<VulnDiscussion>The Pre-Windows 2000 Compatible Access group was created to allow Windows NT domains to interoperate with AD domains by allow...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Membership in the Group Policy Creator Owners and Incoming Forest Trust Builders groups must be limited.
<VulnDiscussion>Membership in the Group Policy Creator Owners and Incoming Forest Trust Builders groups assigns a high privilege level for AD...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
User accounts with delegated authority must be removed from Windows built-in administrative groups or remove the delegated authority from the accounts.
<VulnDiscussion>In AD it is possible to delegate account and other AD object ownership and administration tasks. (This is commonly done for h...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Read-only Domain Controller (RODC) architecture and configuration must comply with directory services requirements.
<VulnDiscussion>The RODC role provides a unidirectional replication method for selected information from your internal network to the DMZ. If...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Usage of administrative accounts must be monitored for suspicious and anomalous activity.
<VulnDiscussion>Monitoring the usage of administrative accounts can alert on suspicious behavior and anomalous account usage that would be in...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Systems must be monitored for attempts to use local accounts to log on remotely from other systems.
<VulnDiscussion>Monitoring for the use of local accounts to log on remotely from other systems may indicate attempted lateral movement in a P...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Systems must be monitored for remote desktop logons.
<VulnDiscussion>Remote Desktop activity for administration should be limited to specific administrators, and from limited management workstat...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Active Directory data must be backed up daily for systems with a Risk Management Framework categorization for Availability of moderate or high. Systems with a categorization of low must be backed up weekly.
<VulnDiscussion>Failure to maintain a current backup of directory data could make it difficult or impossible to recover from incidents includ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Each cross-directory authentication configuration must be documented.
<VulnDiscussion>Active Directory (AD) external, forest, and realm trust configurations are designed to extend resource access to a wider rang...Rule Low Severity -
SRG-OS-000423
<GroupDescription></GroupDescription>Group -
A VPN must be used to protect directory network traffic for directory service implementation spanning enclave boundaries.
<VulnDiscussion>The normal operation of AD requires the use of IP network ports and protocols to support queries, replication, user authentic...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.