Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000134-GPOS-00068

    <GroupDescription></GroupDescription>
    Group
  • Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.

    &lt;VulnDiscussion&gt;A compromised local administrator account can provide means for an attacker to move laterally between domain systems. With U...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • WDigest Authentication must be disabled.

    &lt;VulnDiscussion&gt;When the WDigest Authentication protocol is enabled, plain text passwords are stored in the Local Security Authority Subsyste...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Run as different user must be removed from context menus.

    &lt;VulnDiscussion&gt;The "Run as different user" selection from context menus allows the use of credentials other than the currently logged on use...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Insecure logons to an SMB server must be disabled.

    &lt;VulnDiscussion&gt;Insecure guest logons allow unauthenticated access to shared folders. Shared resources on a system must require authenticati...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Internet connection sharing must be disabled.

    &lt;VulnDiscussion&gt;Internet connection sharing makes it possible for an existing internet connection, such as through wireless, to be shared and...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 must be configured to prioritize ECC Curves with longer key lengths first.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. By default Win...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Simultaneous connections to the internet or a Windows domain must be limited.

    &lt;VulnDiscussion&gt;Multiple network connections can provide additional attack vectors to a system and must be limited. The "Minimize the number ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Connections to non-domain networks when connected to a domain authenticated network must be blocked.

    &lt;VulnDiscussion&gt;Multiple network connections can provide additional attack vectors to a system and should be limited. When connected to a do...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Wi-Fi Sense must be disabled.

    &lt;VulnDiscussion&gt;Wi-Fi Sense automatically connects the system to known hotspots and networks that contacts have shared. It also allows the s...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • Command line data must be included in process creation events.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules