II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000420-DNS-000053
<GroupDescription></GroupDescription>Group -
The Windows DNS Server's IP address must be statically defined and configured locally on the server.
<VulnDiscussion>The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...Rule Medium Severity -
SRG-APP-000420-DNS-000053
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must return data information in response to internal name/address resolution queries.
<VulnDiscussion>The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...Rule Medium Severity -
SRG-APP-000421-DNS-000054
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must use DNSSEC data within queries to confirm data origin to DNS resolvers.
<VulnDiscussion>The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...Rule Medium Severity -
SRG-APP-000422-DNS-000055
<GroupDescription></GroupDescription>Group -
WINS lookups must be disabled on the Windows DNS Server.
<VulnDiscussion>The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...Rule Medium Severity -
SRG-APP-000422-DNS-000055
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must use DNSSEC data within queries to confirm data integrity to DNS resolvers.
<VulnDiscussion>The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...Rule Medium Severity -
SRG-APP-000214-DNS-000025
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must be configured with the Delegation Signer (DS) Resource Records (RR) carrying the signature for the RR that contains the public key of the child zone.
<VulnDiscussion>If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely aff...Rule Medium Severity -
SRG-APP-000215-DNS-000003
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must enforce approved authorizations between DNS servers using digital signatures in the Resource Record Set (RRSet).
<VulnDiscussion>A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design...Rule Medium Severity -
SRG-APP-000215-DNS-000003
<GroupDescription></GroupDescription>Group -
The Name Resolution Policy Table (NRPT) must be configured in Group Policy to enforce clients to request DNSSEC validation for a domain.
<VulnDiscussion>The NRPT is used to require DNSSEC validation. The NRPT can be configured in local Group Policy for a single computer or doma...Rule Medium Severity -
SRG-APP-000215-DNS-000026
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must be configured to validate an authentication chain of parent and child domains via response data.
<VulnDiscussion>If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely aff...Rule Medium Severity -
SRG-APP-000215-DNS-000026
<GroupDescription></GroupDescription>Group -
Trust anchors must be exported from authoritative Windows DNS Servers and distributed to validating Windows DNS Servers.
<VulnDiscussion>If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely aff...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.