Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The setting to allow Microsoft accounts to be optional for modern style apps must be enabled.

    &lt;VulnDiscussion&gt;Control of credentials and the system must be maintained within the enterprise. Enabling this setting allows enterprise cred...
    Rule Low Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.

    &lt;VulnDiscussion&gt;Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...
    Rule Low Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • Autoplay must be turned off for non-volume devices.

    &lt;VulnDiscussion&gt;Allowing autoplay to execute may introduce malicious code to a system. Autoplay begins reading from a drive as soon as you i...
    Rule High Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • The default autorun behavior must be configured to prevent autorun commands.

    &lt;VulnDiscussion&gt;Allowing autorun commands to execute may introduce malicious code to a system. Configuring this setting prevents autorun com...
    Rule High Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • Autoplay must be disabled for all drives.

    &lt;VulnDiscussion&gt;Allowing autoplay to execute may introduce malicious code to a system. Autoplay begins reading from a drive as soon as you i...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Enhanced anti-spoofing for facial recognition must be enabled on Window 10.

    &lt;VulnDiscussion&gt;Enhanced anti-spoofing provides additional protections when using facial recognition with devices that support it.&lt;/VulnDi...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Microsoft consumer experiences must be turned off.

    &lt;VulnDiscussion&gt;Microsoft consumer experiences provides suggestions and notifications to users, which may include the installation of Windows...
    Rule Low Severity
  • SRG-OS-000134-GPOS-00068

    <GroupDescription></GroupDescription>
    Group
  • Administrator accounts must not be enumerated during elevation.

    &lt;VulnDiscussion&gt;Enumeration of administrator accounts when elevating can provide part of the logon information to an unauthorized user. This...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • If Enhanced diagnostic data is enabled it must be limited to the minimum required to support Windows Analytics.

    &lt;VulnDiscussion&gt;Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Telemetry must not be configured to Full.

    &lt;VulnDiscussion&gt;Some features may communicate with the vendor, sending system information or downloading data or components for the feature. ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Update must not obtain updates from other PCs on the internet.

    &lt;VulnDiscussion&gt;Windows 10 allows Windows Update to obtain updates from additional sources instead of Microsoft. In addition to Microsoft, up...
    Rule Low Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The Windows Defender SmartScreen for Explorer must be enabled.

    &lt;VulnDiscussion&gt;Windows Defender SmartScreen helps protect systems from programs downloaded from the internet that may be malicious. Enabling...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00192

    <GroupDescription></GroupDescription>
    Group
  • Explorer Data Execution Prevention must be enabled.

    &lt;VulnDiscussion&gt;Data Execution Prevention (DEP) provides additional protection by performing checks on memory to help prevent malicious code...
    Rule Medium Severity
  • SRG-OS-000420-GPOS-00186

    <GroupDescription></GroupDescription>
    Group
  • Turning off File Explorer heap termination on corruption must be disabled.

    &lt;VulnDiscussion&gt;Legacy plug-in applications may continue to function when a File Explorer session has become corrupt. Disabling this feature...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • File Explorer shell protocol must run in protected mode.

    &lt;VulnDiscussion&gt;The shell protocol will limit the set of folders applications can open when run in protected mode. Restricting files an app...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for malicious websites in Microsoft Edge.

    &lt;VulnDiscussion&gt;The Windows Defender SmartScreen filter in Microsoft Edge provides warning messages and blocks potentially malicious websites...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for unverified files in Microsoft Edge.

    &lt;VulnDiscussion&gt;The Windows Defender SmartScreen filter in Microsoft Edge provides warning messages and blocks potentially malicious websites...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 must be configured to prevent certificate error overrides in Microsoft Edge.

    &lt;VulnDiscussion&gt;Web security certificates provide an indication whether a site is legitimate. This policy setting prevents the user from igno...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The password manager function in the Edge browser must be disabled.

    &lt;VulnDiscussion&gt;Passwords save locally for re-use when browsing may be subject to compromise. Disabling the Edge password manager will preve...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Windows Defender SmartScreen filter for Microsoft Edge must be enabled.

    &lt;VulnDiscussion&gt;The Windows Defender SmartScreen filter in Microsoft Edge provides warning messages and blocks potentially malicious websites...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 must be configured to disable Windows Game Recording and Broadcasting.

    &lt;VulnDiscussion&gt;Windows Game Recording and Broadcasting is intended for use with games, however it could potentially record screen shots of o...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The use of a hardware security device with Windows Hello for Business must be enabled.

    &lt;VulnDiscussion&gt;The use of a Trusted Platform Module (TPM) to store keys for Windows Hello for Business provides additional security. Keys s...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 must be configured to require a minimum pin length of six characters or greater.

    &lt;VulnDiscussion&gt;Windows allows the use of PINs as well as biometrics for authentication without sending a password to a network or website wh...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • Passwords must not be saved in the Remote Desktop Client.

    &lt;VulnDiscussion&gt;Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to anoth...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • Local drives must be prevented from sharing with Remote Desktop Session Hosts.

    &lt;VulnDiscussion&gt;Preventing users from sharing the local drives on their client computers to Remote Session Hosts that they access helps reduc...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules