Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The system must be configured to prevent anonymous users from having the same rights as the Everyone group.

    &lt;VulnDiscussion&gt;Access by anonymous users must be restricted. If this setting is enabled, then anonymous users have the same rights and perm...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • Anonymous access to Named Pipes and Shares must be restricted.

    &lt;VulnDiscussion&gt;Allowing anonymous access to named pipes or shares provides the potential for unauthorized system access. This setting restr...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • Remote calls to the Security Account Manager (SAM) must be restricted to Administrators.

    &lt;VulnDiscussion&gt;The Windows Security Account Manager (SAM) stores users' passwords. Restricting remote rpc connections to the SAM to Adminis...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • NTLM must be prevented from falling back to a Null session.

    &lt;VulnDiscussion&gt;NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access.&lt;/VulnDiscussi...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • PKU2U authentication using online identities must be prevented.

    &lt;VulnDiscussion&gt;PKU2U is a peer-to-peer authentication protocol. This setting prevents online identities from authenticating to domain-join...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    <GroupDescription></GroupDescription>
    Group
  • Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.

    &lt;VulnDiscussion&gt;Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for Kerberos, pr...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • The system must be configured to prevent the storage of the LAN Manager hash of passwords.

    &lt;VulnDiscussion&gt;The LAN Manager hash uses a weak encryption algorithm and there are several tools available that use this hash to retrieve ac...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.

    &lt;VulnDiscussion&gt;The Kerberos v5 authentication protocol is the default for authentication of users who are logging on to domain accounts. NT...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The system must be configured to the required LDAP client signing level.

    &lt;VulnDiscussion&gt;This setting controls the signing requirements for LDAP clients. This setting must be set to Negotiate signing or Require si...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The system must be configured to meet the minimum session security requirement for NTLM SSP based clients.

    &lt;VulnDiscussion&gt;Microsoft has implemented a variety of security support providers for use with RPC sessions. All of the options must be enab...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules