Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000066-GPOS-00034

    <GroupDescription></GroupDescription>
    Group
  • The US DoD CCEB Interoperability Root CA cross-certificates must be installed in the Untrusted Certificates Store on unclassified systems.

    &lt;VulnDiscussion&gt;To ensure users do not experience denial of service when performing certificate-based authentication to DoD websites due to t...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained.

    &lt;VulnDiscussion&gt;The registry is integral to the function, security, and stability of the Windows system. Changing the system's registry perm...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    <GroupDescription></GroupDescription>
    Group
  • The built-in administrator account must be disabled.

    &lt;VulnDiscussion&gt;The built-in administrator account is a well-known account subject to attack. It also provides no accountability to individu...
    Rule Medium Severity
  • SRG-OS-000121-GPOS-00062

    <GroupDescription></GroupDescription>
    Group
  • The built-in guest account must be disabled.

    &lt;VulnDiscussion&gt;A system faces an increased vulnerability threat if the built-in guest account is not disabled. This account is a known acco...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Local accounts with blank passwords must be restricted to prevent access from the network.

    &lt;VulnDiscussion&gt;An account without a password can allow unauthorized access to a system as only the username would be required. Password pol...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The built-in administrator account must be renamed.

    &lt;VulnDiscussion&gt;The built-in administrator account is a well-known account subject to attack. Renaming this account to an unidentified name ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The built-in guest account must be renamed.

    &lt;VulnDiscussion&gt;The built-in guest account is a well-known user account on all Windows systems and, as initially installed, does not require ...
    Rule Medium Severity
  • SRG-OS-000062-GPOS-00031

    <GroupDescription></GroupDescription>
    Group
  • Audit policy using subcategories must be enabled.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • Outgoing secure channel traffic must be encrypted or signed.

    &lt;VulnDiscussion&gt;Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not al...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • Outgoing secure channel traffic must be encrypted when possible.

    &lt;VulnDiscussion&gt;Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not al...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • Outgoing secure channel traffic must be signed when possible.

    &lt;VulnDiscussion&gt;Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the ch...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The computer account password must not be prevented from being reset.

    &lt;VulnDiscussion&gt;Computer account passwords are changed automatically on a regular basis. Disabling automatic password changes can make the s...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The maximum age for machine account passwords must be configured to 30 days or less.

    &lt;VulnDiscussion&gt;Computer account passwords are changed automatically on a regular basis. This setting controls the maximum password age that...
    Rule Low Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • The system must be configured to require a strong session key.

    &lt;VulnDiscussion&gt;A computer connecting to a domain controller will establish a secure channel. Requiring strong session keys enforces 128-bit...
    Rule Medium Severity
  • SRG-OS-000029-GPOS-00010

    <GroupDescription></GroupDescription>
    Group
  • The machine inactivity limit must be set to 15 minutes, locking the system with the screensaver.

    &lt;VulnDiscussion&gt;Unattended systems are susceptible to unauthorized use and should be locked when unattended. The screen saver should be set ...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • The required legal notice must be configured to display before console logon.

    &lt;VulnDiscussion&gt;Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • The Windows dialog box title for the legal banner must be configured.

    &lt;VulnDiscussion&gt;Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Caching of logon credentials must be limited.

    &lt;VulnDiscussion&gt;The default Windows configuration caches the last logon credentials for users who log on interactively to a system. This fea...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Smart Card removal option must be configured to Force Logoff or Lock Workstation.

    &lt;VulnDiscussion&gt;Unattended systems are susceptible to unauthorized use and must be locked. Configuring a system to lock when a smart card is...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • The Windows SMB client must be configured to always perform SMB packet signing.

    &lt;VulnDiscussion&gt;The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in ...
    Rule Medium Severity
  • SRG-OS-000074-GPOS-00042

    <GroupDescription></GroupDescription>
    Group
  • Unencrypted passwords must not be sent to third-party SMB Servers.

    &lt;VulnDiscussion&gt;Some non-Microsoft SMB servers only support unencrypted (plain text) password authentication. Sending plain text passwords a...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • The Windows SMB server must be configured to always perform SMB packet signing.

    &lt;VulnDiscussion&gt;The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Anonymous SID/Name translation must not be allowed.

    &lt;VulnDiscussion&gt;Allowing anonymous SID/Name translation can provide sensitive information for accessing a system. Only authorized users must...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Anonymous enumeration of SAM accounts must not be allowed.

    &lt;VulnDiscussion&gt;Anonymous enumeration of SAM accounts allows anonymous log on users (null session connections) to list all accounts names, th...
    Rule High Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • Anonymous enumeration of shares must be restricted.

    &lt;VulnDiscussion&gt;Allowing anonymous logon users (null session connections) to list all account names and enumerate all shared resources can pr...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules