Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 AutoPlay must be disabled for all drives.

    &lt;VulnDiscussion&gt;Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon media is ...
    Rule High Severity
  • SRG-OS-000370-GPOS-00155

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.

    &lt;VulnDiscussion&gt;Using an allowlist provides a configuration management method to allow the execution of only authorized software. Using only ...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must not save passwords in the Remote Desktop Client.

    &lt;VulnDiscussion&gt;Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to anoth...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 Remote Desktop Services must always prompt a client for passwords upon connection.

    &lt;VulnDiscussion&gt;This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Disa...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 Windows Remote Management (WinRM) service must not store RunAs credentials.

    &lt;VulnDiscussion&gt;Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Windo...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 User Account Control approval mode for the built-in Administrator must be enabled.

    &lt;VulnDiscussion&gt;User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative account...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 User Account Control must automatically deny standard user requests for elevation.

    &lt;VulnDiscussion&gt;User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative account...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 User Account Control must run all administrators in Admin Approval Mode, enabling UAC.

    &lt;VulnDiscussion&gt;User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative account...
    Rule Medium Severity
  • SRG-OS-000379-GPOS-00164

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must restrict unauthenticated Remote Procedure Call (RPC) clients from connecting to the RPC server on domain-joined member servers and standalone or nondomain-joined systems.

    &lt;VulnDiscussion&gt;Unauthenticated RPC clients may allow anonymous access to sensitive information. Configuring RPC to restrict unauthenticated ...
    Rule Medium Severity
  • SRG-OS-000379-GPOS-00164

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 computer account password must not be prevented from being reset.

    &lt;VulnDiscussion&gt;Computer account passwords are changed automatically on a regular basis. Disabling automatic password changes can make the sy...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules