Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The system must be configured to prevent IP source routing.

    &lt;VulnDiscussion&gt;Configuring the system to disable IP source routing protects against spoofing.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.

    &lt;VulnDiscussion&gt;Allowing ICMP redirect of routes can lead to traffic not being routed properly. When disabled, this forces ICMP to be routed...
    Rule Low Severity
  • SRG-OS-000420-GPOS-00186

    <GroupDescription></GroupDescription>
    Group
  • The system must be configured to ignore NetBIOS name release requests except from WINS servers.

    &lt;VulnDiscussion&gt;Configuring the system to ignore name release requests, except from WINS servers, prevents a denial of service (DoS) attack. ...
    Rule Low Severity
  • SRG-OS-000134-GPOS-00068

    <GroupDescription></GroupDescription>
    Group
  • Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.

    &lt;VulnDiscussion&gt;A compromised local administrator account can provide means for an attacker to move laterally between domain systems. With U...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • WDigest Authentication must be disabled.

    &lt;VulnDiscussion&gt;When the WDigest Authentication protocol is enabled, plain text passwords are stored in the Local Security Authority Subsyste...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Run as different user must be removed from context menus.

    &lt;VulnDiscussion&gt;The "Run as different user" selection from context menus allows the use of credentials other than the currently logged on use...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Insecure logons to an SMB server must be disabled.

    &lt;VulnDiscussion&gt;Insecure guest logons allow unauthenticated access to shared folders. Shared resources on a system must require authenticatio...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Internet connection sharing must be disabled.

    &lt;VulnDiscussion&gt;Internet connection sharing makes it possible for an existing internet connection, such as through wireless, to be shared and...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Hardened UNC Paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.

    &lt;VulnDiscussion&gt;Additional security requirements are applied to Universal Naming Convention (UNC) paths specified in Hardened UNC paths befor...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    <GroupDescription></GroupDescription>
    Group
  • Windows 11 must be configured to prioritize ECC Curves with longer key lengths first.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. By default Win...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules