III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Domain-joined systems must use Windows 11 Enterprise Edition 64-bit version.
<VulnDiscussion>Features such as Credential Guard use virtualization-based security to protect information that could be used in credential t...Rule Medium Severity -
SRG-OS-000424-GPOS-00188
<GroupDescription></GroupDescription>Group -
Windows 11 domain-joined systems must have a Trusted Platform Module (TPM) enabled.
<VulnDiscussion>Credential Guard uses virtualization-based security to protect information that could be used in credential theft attacks if ...Rule Medium Severity -
SRG-OS-000424-GPOS-00188
<GroupDescription></GroupDescription>Group -
Windows 11 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
<VulnDiscussion>UEFI provides additional security features in comparison to legacy BIOS firmware, including Secure Boot. UEFI is required to ...Rule Medium Severity -
SRG-OS-000424-GPOS-00188
<GroupDescription></GroupDescription>Group -
Secure Boot must be enabled on Windows 11 systems.
<VulnDiscussion>Secure Boot is a standard that ensures systems boot only to a trusted operating system. Secure Boot is required to support ad...Rule Medium Severity -
SRG-OS-000191-GPOS-00080
<GroupDescription></GroupDescription>Group -
Windows 11 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: Continuously, where ESS is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
<VulnDiscussion>An approved tool for continuous network scanning must be installed and configured to run. Without the use of automated mecha...Rule Medium Severity -
SRG-OS-000404-GPOS-00183
<GroupDescription></GroupDescription>Group -
Windows 11 information systems must use BitLocker to encrypt all disks to protect the confidentiality and integrity of all information at rest.
<VulnDiscussion>If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data acc...Rule High Severity -
SRG-OS-000405-GPOS-00184
<GroupDescription></GroupDescription>Group -
Windows 11 systems must use a BitLocker PIN for pre-boot authentication.
<VulnDiscussion>If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data acc...Rule High Severity -
SRG-OS-000121-GPOS-00062
<GroupDescription></GroupDescription>Group -
Windows 11 systems must use a BitLocker PIN with a minimum length of six digits for pre-boot authentication.
<VulnDiscussion>If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data acc...Rule Medium Severity -
SRG-OS-000370-GPOS-00155
<GroupDescription></GroupDescription>Group -
The operating system must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
<VulnDiscussion>Utilizing an allowlist provides a configuration management method for allowing the execution of only authorized software. Usi...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows 11 systems must be maintained at a supported servicing level.
<VulnDiscussion>Windows 11 is maintained by Microsoft at servicing levels for specific periods of time to support Windows as a Service. Syste...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Windows 11 system must use an antivirus program.
<VulnDiscussion>Malicious software can establish a base on individual desktops and servers. Employing an automated mechanism to detect this t...Rule High Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
Local volumes must be formatted using NTFS.
<VulnDiscussion>The ability to set access permissions and auditing is critical to maintaining the security and proper access controls of a sy...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Alternate operating systems must not be permitted on the same system.
<VulnDiscussion>Allowing other operating systems to run on a secure system may allow security to be circumvented.</VulnDiscussion><F...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
Non-system-created file shares on a system must limit access to groups that require it.
<VulnDiscussion>Shares which provide network access, must not exist on a workstation except for system-created administrative shares, and cou...Rule Medium Severity -
SRG-OS-000468-GPOS-00212
<GroupDescription></GroupDescription>Group -
Unused accounts must be disabled or removed from the system after 35 days of inactivity.
<VulnDiscussion>Outdated or unused accounts provide penetration points that may go undetected. Inactive accounts must be deleted if no longer...Rule Low Severity -
SRG-OS-000312-GPOS-00123
<GroupDescription></GroupDescription>Group -
Only accounts responsible for the administration of a system must have Administrator rights on the system.
<VulnDiscussion>An account that does not have Administrator duties must not have Administrator rights. Such rights would allow the account to...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Only accounts responsible for the backup operations must be members of the Backup Operators group.
<VulnDiscussion>Backup Operators are able to read and write to any file in the system, regardless of the rights assigned to it. Backup and re...Rule Medium Severity -
SRG-OS-000312-GPOS-00124
<GroupDescription></GroupDescription>Group -
Only authorized user accounts must be allowed to create or run virtual machines on Windows 11 systems.
<VulnDiscussion>Allowing other operating systems to run on a secure system may allow users to circumvent security. For Hyper-V, preventing un...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Standard local user accounts must not exist on a system in a domain.
<VulnDiscussion>To minimize potential points of attack, local user accounts, other than built-in accounts and local administrator accounts, m...Rule Low Severity -
SRG-OS-000076-GPOS-00044
<GroupDescription></GroupDescription>Group -
Accounts must be configured to require password expiration.
<VulnDiscussion>Passwords that do not expire increase exposure with a greater probability of being discovered or cracked.</VulnDiscussion&...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
<GroupDescription></GroupDescription>Group -
Permissions for system files and directories must conform to minimum requirements.
<VulnDiscussion>Changing the system's file and directory permissions allows the possibility of unauthorized and anonymous modification to the...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Internet Information System (IIS) or its subcomponents must not be installed on a workstation.
<VulnDiscussion>IIS is not installed by default. Installation of Internet Information System (IIS) may allow unauthorized internet services t...Rule High Severity -
SRG-OS-000096-GPOS-00050
<GroupDescription></GroupDescription>Group -
Simple Network Management Protocol (SNMP) must not be installed on the system.
<VulnDiscussion>"SNMP" is not installed by default. Some protocols and services do not support required security features, such as encrypting...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Simple TCP/IP Services must not be installed on the system.
<VulnDiscussion>"Simple TCP/IP Services" is not installed by default. Some protocols and services do not support required security features, ...Rule Medium Severity -
SRG-OS-000096-GPOS-00050
<GroupDescription></GroupDescription>Group -
The Telnet Client must not be installed on the system.
<VulnDiscussion>The "Telnet Client" is not installed by default. Some protocols and services do not support required security features, such ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.