Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.

    &lt;VulnDiscussion&gt;The server message block (SMB) protocol provides the basis for many network operations. If this policy is enabled, the SMB cl...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.

    &lt;VulnDiscussion&gt;The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in p...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.

    &lt;VulnDiscussion&gt;The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in p...
    Rule Medium Severity
  • SRG-OS-000425-GPOS-00189

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must implement protection methods such as TLS, encrypted VPNs, or IPsec if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for examp...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00192

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 Explorer Data Execution Prevention must be enabled.

    &lt;VulnDiscussion&gt;Data Execution Prevention provides additional protection by performing checks on memory to help prevent malicious code from r...
    Rule Medium Severity
  • SRG-OS-000470-GPOS-00214

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to audit Account Logon - Credential Validation successes.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000470-GPOS-00214

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to audit Account Logon - Credential Validation failures.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000470-GPOS-00214

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to audit Logon/Logoff - Group Membership successes.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000470-GPOS-00214

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to audit Logon/Logoff - Special Logon successes.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000470-GPOS-00214

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to audit Object Access - Other Object Access Events successes.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000470-GPOS-00214

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to audit Object Access - Other Object Access Events failures.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000472-GPOS-00217

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to audit logoff successes.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000474-GPOS-00219

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to audit Detailed Tracking - Plug and Play Events successes.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000474-GPOS-00219

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to audit Object Access - Removable Storage successes.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000474-GPOS-00219

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to audit Object Access - Removable Storage failures.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000478-GPOS-00223

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.

    &lt;VulnDiscussion&gt;This setting ensures the system uses algorithms that are FIPS-compliant for encryption, hashing, and signing. FIPS-compliant ...
    Rule Medium Severity
  • SRG-OS-000479-GPOS-00224

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must, at a minimum, offload audit records of interconnected systems in real time and offload standalone or nondomain-joined systems weekly.

    &lt;VulnDiscussion&gt;Protection of log data includes ensuring the log data is not accidentally lost or deleted. Audit information stored in one lo...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.

    &lt;VulnDiscussion&gt;Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently int...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.

    &lt;VulnDiscussion&gt;Using applications that access the Internet or have potential Internet sources using administrative privileges exposes a syst...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.

    &lt;VulnDiscussion&gt;Backup Operators are able to read and write to any file in the system, regardless of the rights assigned to it. Backup and re...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.

    &lt;VulnDiscussion&gt;Setting application account passwords to expire may cause applications to stop functioning. However, not changing them on a r...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.

    &lt;VulnDiscussion&gt;Credential Guard uses virtualization-based security to protect data that could be used in credential theft attacks if comprom...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be maintained at a supported servicing level.

    &lt;VulnDiscussion&gt;Systems at unsupported servicing levels will not receive security updates for new vulnerabilities, which leave them subject t...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must use an anti-virus program.

    &lt;VulnDiscussion&gt;Malicious software can establish a base on individual desktops and servers. Employing an automated mechanism to detect this t...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must have a host-based intrusion detection or prevention system.

    &lt;VulnDiscussion&gt;A properly configured Host-based Intrusion Detection System (HIDS) or Host-based Intrusion Prevention System (HIPS) provides ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules