II - Mission Support Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
Local drives must be prevented from sharing with Remote Desktop Session Hosts.
<VulnDiscussion>Preventing users from sharing the local drives on their client computers to Remote Session Hosts that they access helps reduc...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
Remote Desktop Services must always prompt a client for passwords upon connection.
<VulnDiscussion>This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Dis...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
The Remote Desktop Session Host must require secure RPC communications.
<VulnDiscussion>Allowing unsecure RPC communication exposes the system to man in the middle attacks and data disclosure attacks. A man in the...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
Remote Desktop Services must be configured with the client connection encryption set to the required level.
<VulnDiscussion>Remote connections must be encrypted to prevent interception of data or sensitive information. Selecting "High Level" will en...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Attachments must be prevented from being downloaded from RSS feeds.
<VulnDiscussion>Attachments from RSS feeds may not be secure. This setting will prevent attachments from being downloaded from RSS feeds.<...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Basic authentication for RSS feeds over HTTP must not be used.
<VulnDiscussion>Basic authentication uses plain text passwords that could be used to compromise a system.</VulnDiscussion><FalsePosi...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Indexing of encrypted files must be turned off.
<VulnDiscussion>Indexing of encrypted files may expose sensitive data. This setting prevents encrypted files from being indexed.</VulnDis...Rule Medium Severity -
SRG-OS-000362-GPOS-00149
<GroupDescription></GroupDescription>Group -
Users must be prevented from changing installation options.
<VulnDiscussion>Installation options for applications are typically controlled by administrators. This setting prevents users from changing ...Rule Medium Severity -
SRG-OS-000362-GPOS-00149
<GroupDescription></GroupDescription>Group -
The Windows Installer Always install with elevated privileges must be disabled.
<VulnDiscussion>Standard user accounts must not be granted elevated privileges. Enabling Windows Installer to elevate privileges when instal...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Users must be notified if a web-based program attempts to install software.
<VulnDiscussion>Web-based programs may attempt to install malicious software on a system. Ensuring users are notified if a web-based program...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
Automatically signing in the last interactive user after a system-initiated restart must be disabled.
<VulnDiscussion>Windows can be configured to automatically sign the user back in after a Windows Update restart. Some protections are in pla...Rule Medium Severity -
SRG-OS-000042-GPOS-00020
<GroupDescription></GroupDescription>Group -
PowerShell script block logging must be enabled on Windows 10.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
The Windows Explorer Preview pane must be disabled for Windows 10.
<VulnDiscussion>A known vulnerability in Windows 10 could allow the execution of malicious code by either opening a compromised document or v...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
The Windows Remote Management (WinRM) client must not use Basic authentication.
<VulnDiscussion>Basic authentication uses plain text passwords that could be used to compromise a system.</VulnDiscussion><FalsePosi...Rule High Severity -
SRG-OS-000393-GPOS-00173
<GroupDescription></GroupDescription>Group -
The Windows Remote Management (WinRM) client must not allow unencrypted traffic.
<VulnDiscussion>Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connectio...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
The Windows Remote Management (WinRM) service must not use Basic authentication.
<VulnDiscussion>Basic authentication uses plain text passwords that could be used to compromise a system.</VulnDiscussion><FalsePosi...Rule High Severity -
SRG-OS-000393-GPOS-00173
<GroupDescription></GroupDescription>Group -
The Windows Remote Management (WinRM) service must not allow unencrypted traffic.
<VulnDiscussion>Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connectio...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
The Windows Remote Management (WinRM) service must not store RunAs credentials.
<VulnDiscussion>Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Wind...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
The Windows Remote Management (WinRM) client must not use Digest authentication.
<VulnDiscussion>Digest authentication is not as strong as other options and may be subject to man-in-the-middle attacks.</VulnDiscussion&g...Rule Medium Severity -
SRG-OS-000028-GPOS-00009
<GroupDescription></GroupDescription>Group -
Windows 10 must be configured to prevent Windows apps from being activated by voice while the system is locked.
<VulnDiscussion>Allowing Windows apps to be activated by voice from the lock screen could allow for unauthorized use. Requiring logon will en...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The convenience PIN for Windows 10 must be disabled.
<VulnDiscussion>This policy controls whether a domain user can sign in using a convenience PIN to prevent enabling (Password Stuffer).</Vu...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Ink Workspace must be configured to disallow access above the lock.
<VulnDiscussion>This action secures Windows Ink, which contains applications and features oriented toward pen computing.</VulnDiscussion&g...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows 10 should be configured to prevent users from receiving suggestions for third-party or additional applications.
<VulnDiscussion>Windows spotlight features may suggest apps and content from third-party software publishers in addition to Microsoft apps an...Rule Low Severity -
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled.
<VulnDiscussion>Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The DoD Root CA certificates must be installed in the Trusted Root Store.
<VulnDiscussion>To ensure secure DoD websites and DoD-signed code are properly validated, the system must trust the DoD Root Certificate Auth...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.