Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The network selection user interface (UI) must not be displayed on the logon screen.

    &lt;VulnDiscussion&gt;Enabling interaction with the network selection UI allows users to change connections to available networks without signing i...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Local users on domain-joined computers must not be enumerated.

    &lt;VulnDiscussion&gt;The username is one part of logon credentials that could be used to gain access to a system. Preventing the enumeration of us...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • Users must be prompted for a password on resume from sleep (on battery).

    &lt;VulnDiscussion&gt;Authentication must always be required when accessing a system. This setting ensures the user is prompted for a password on ...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • The user must be prompted for a password on resume from sleep (plugged in).

    &lt;VulnDiscussion&gt;Authentication must always be required when accessing a system. This setting ensures the user is prompted for a password on ...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • Solicited Remote Assistance must not be allowed.

    &lt;VulnDiscussion&gt;Remote assistance allows another user to view or take control of the local session of a user. Solicited assistance is help t...
    Rule High Severity
  • SRG-OS-000379-GPOS-00164

    <GroupDescription></GroupDescription>
    Group
  • Unauthenticated RPC clients must be restricted from connecting to the RPC server.

    &lt;VulnDiscussion&gt;Configuring RPC to restrict unauthenticated RPC clients from connecting to the RPC server will prevent anonymous connections....
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The setting to allow Microsoft accounts to be optional for modern style apps must be enabled.

    &lt;VulnDiscussion&gt;Control of credentials and the system must be maintained within the enterprise. Enabling this setting allows enterprise cred...
    Rule Low Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.

    &lt;VulnDiscussion&gt;Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...
    Rule Low Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • Autoplay must be turned off for non-volume devices.

    &lt;VulnDiscussion&gt;Allowing autoplay to execute may introduce malicious code to a system. Autoplay begins reading from a drive as soon as you i...
    Rule High Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • The default autorun behavior must be configured to prevent autorun commands.

    &lt;VulnDiscussion&gt;Allowing autorun commands to execute may introduce malicious code to a system. Configuring this setting prevents autorun com...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules