III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The system must be configured to prevent IP source routing.
<VulnDiscussion>Configuring the system to disable IP source routing protects against spoofing.</VulnDiscussion><FalsePositives>&l...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.
<VulnDiscussion>Allowing ICMP redirect of routes can lead to traffic not being routed properly. When disabled, this forces ICMP to be routed...Rule Low Severity -
SRG-OS-000420-GPOS-00186
<GroupDescription></GroupDescription>Group -
The system must be configured to ignore NetBIOS name release requests except from WINS servers.
<VulnDiscussion>Configuring the system to ignore name release requests, except from WINS servers, prevents a denial of service (DoS) attack. ...Rule Low Severity -
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.
<VulnDiscussion>A compromised local administrator account can provide means for an attacker to move laterally between domain systems. With U...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
WDigest Authentication must be disabled.
<VulnDiscussion>When the WDigest Authentication protocol is enabled, plain text passwords are stored in the Local Security Authority Subsyste...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Run as different user must be removed from context menus.
<VulnDiscussion>The "Run as different user" selection from context menus allows the use of credentials other than the currently logged on use...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Insecure logons to an SMB server must be disabled.
<VulnDiscussion>Insecure guest logons allow unauthenticated access to shared folders. Shared resources on a system must require authenticatio...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Internet connection sharing must be disabled.
<VulnDiscussion>Internet connection sharing makes it possible for an existing internet connection, such as through wireless, to be shared and...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Hardened UNC Paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
<VulnDiscussion>Additional security requirements are applied to Universal Naming Convention (UNC) paths specified in Hardened UNC paths befor...Rule Medium Severity -
SRG-OS-000120-GPOS-00061
<GroupDescription></GroupDescription>Group -
Windows 11 must be configured to prioritize ECC Curves with longer key lengths first.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. By default Win...Rule Medium Severity -
SRG-OS-000481-GPOS-00481
<GroupDescription></GroupDescription>Group -
Simultaneous connections to the internet or a Windows domain must be limited.
<VulnDiscussion>Multiple network connections can provide additional attack vectors to a system and must be limited. The "Minimize the number ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Connections to non-domain networks when connected to a domain authenticated network must be blocked.
<VulnDiscussion>Multiple network connections can provide additional attack vectors to a system and must be limited. When connected to a domai...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Wi-Fi Sense must be disabled.
<VulnDiscussion>Wi-Fi Sense automatically connects the system to known hotspots and networks that contacts have shared. It also allows the sh...Rule Medium Severity -
SRG-OS-000042-GPOS-00020
<GroupDescription></GroupDescription>Group -
Command line data must be included in process creation events.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows 11 must be configured to enable Remote host allows delegation of non-exportable credentials.
<VulnDiscussion>An exportable version of credentials is provided to remote hosts when using credential delegation which exposes them to theft...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Virtualization-based Security must be enabled on Windows 11 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
<VulnDiscussion>Virtualization-based Security (VBS) provides the platform for the additional security features, Credential Guard and virtuali...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Credential Guard must be running on Windows 11 domain-joined systems.
<VulnDiscussion>Credential Guard uses virtualization-based security to protect information that could be used in credential theft attacks if ...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Virtualization-based protection of code integrity must be enabled.
<VulnDiscussion>Virtualization-based protection of code integrity enforces kernel mode memory protections as well as protecting Code Integrit...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers.
<VulnDiscussion>The default behavior is for Early Launch Antimalware - Boot-Start Driver Initialization policy is to enforce "Good, unknown a...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Group Policy objects must be reprocessed even if they have not changed.
<VulnDiscussion>Enabling this setting and then selecting the "Process even if the Group Policy objects have not changed" option ensures that ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Downloading print driver packages over HTTP must be prevented.
<VulnDiscussion>Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Web publishing and online ordering wizards must be prevented from downloading a list of providers.
<VulnDiscussion>Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Printing over HTTP must be prevented.
<VulnDiscussion>Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Systems must at least attempt device authentication using certificates.
<VulnDiscussion>Using certificates to authenticate devices to the domain provides increased security over passwords. By default systems will ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The network selection user interface (UI) must not be displayed on the logon screen.
<VulnDiscussion>Enabling interaction with the network selection UI allows users to change connections to available networks without signing i...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.