I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2022 users must be notified if a web-based program attempts to install software.
<VulnDiscussion>Web-based programs may attempt to install malicious software on a system. Ensuring users are notified if a web-based program ...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must disable automatically signing in the last interactive user after a system-initiated restart.
<VulnDiscussion>Windows can be configured to automatically sign the user back in after a Windows Update restart. Some protections are in plac...Rule Medium Severity -
SRG-OS-000042-GPOS-00020
<GroupDescription></GroupDescription>Group -
Windows Server 2022 PowerShell script block logging must be enabled.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
Windows Server 2022 Windows Remote Management (WinRM) client must not use Basic authentication.
<VulnDiscussion>Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will...Rule High Severity -
SRG-OS-000393-GPOS-00173
<GroupDescription></GroupDescription>Group -
Windows Server 2022 Windows Remote Management (WinRM) client must not allow unencrypted traffic.
<VulnDiscussion>Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connection...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.