III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000420-DNS-000053
<GroupDescription></GroupDescription>Group -
The Windows DNS Server's IP address must be statically defined and configured locally on the server.
<VulnDiscussion>The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...Rule Medium Severity -
SRG-APP-000420-DNS-000053
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must return data information in response to internal name/address resolution queries.
<VulnDiscussion>The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...Rule Medium Severity -
SRG-APP-000421-DNS-000054
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must use DNSSEC data within queries to confirm data origin to DNS resolvers.
<VulnDiscussion>The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...Rule Medium Severity -
SRG-APP-000422-DNS-000055
<GroupDescription></GroupDescription>Group -
WINS lookups must be disabled on the Windows DNS Server.
<VulnDiscussion>The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...Rule Medium Severity -
SRG-APP-000422-DNS-000055
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must use DNSSEC data within queries to confirm data integrity to DNS resolvers.
<VulnDiscussion>The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.