III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Zone information must be preserved when saving attachments.
<VulnDiscussion>Preserving zone of origin (internet, intranet, local, restricted) information on file attachments allows Windows to determine...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The Access this computer from the network user right must only be assigned to the Administrators and Remote Desktop Users groups.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Act as part of the operating system user right must not be assigned to any groups or accounts.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule High Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The Allow log on locally user right must only be assigned to the Administrators and Users groups.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Back up files and directories user right must only be assigned to the Administrators group.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Change the system time user right must only be assigned to Administrators and Local Service and NT SERVICE\autotimesvc.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Create a pagefile user right must only be assigned to the Administrators group.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Create a token object user right must not be assigned to any groups or accounts.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. The "Create a t...Rule High Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Create permanent shared objects user right must not be assigned to any groups or accounts.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Create symbolic links user right must only be assigned to the Administrators group.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Debug programs user right must only be assigned to the Administrators group.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule High Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The Deny access to this computer from the network user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny acces...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log o...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The Deny log on as a service user right on Windows 10 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. The "Deny log o...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The Deny log on locally user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log o...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The Deny log on through Remote Desktop Services user right on Windows 10 workstations must at a minimum be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log o...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Enable computer and user accounts to be trusted for delegation user right must not be assigned to any groups or accounts.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. The "Enable com...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Force shutdown from a remote system user right must only be assigned to the Administrators group.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. The "Impersonat...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Load and unload device drivers user right must only be assigned to the Administrators group.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. The "Load and u...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Lock pages in memory user right must not be assigned to any groups or accounts.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. The "Lock pages...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The Manage auditing and security log user right must only be assigned to the Administrators group.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Modify firmware environment values user right must only be assigned to the Administrators group.
<VulnDiscussion>Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with t...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.