Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.

    &lt;VulnDiscussion&gt;Credential Guard uses virtualization-based security to protect information that could be used in credential theft attacks if ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.

    &lt;VulnDiscussion&gt;UEFI provides additional security features in comparison to legacy BIOS firmware, including Secure Boot. UEFI is required to ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Secure Boot must be enabled on Windows 10 systems.

    &lt;VulnDiscussion&gt;Secure Boot is a standard that ensures systems boot only to a trusted operating system. Secure Boot is required to support ad...
    Rule Low Severity
  • SRG-OS-000191-GPOS-00080

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: Continuously, where ESS is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).

    &lt;VulnDiscussion&gt;An approved tool for continuous network scanning must be installed and configured to run. Without the use of automated mecha...
    Rule Medium Severity
  • SRG-OS-000185-GPOS-00079

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 information systems must use BitLocker to encrypt all disks to protect the confidentiality and integrity of all information at rest.

    &lt;VulnDiscussion&gt;If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data acc...
    Rule High Severity
  • SRG-OS-000185-GPOS-00079

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 systems must use a BitLocker PIN for pre-boot authentication.

    &lt;VulnDiscussion&gt;If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data acc...
    Rule High Severity
  • SRG-OS-000185-GPOS-00079

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 systems must use a BitLocker PIN with a minimum length of six digits for pre-boot authentication.

    &lt;VulnDiscussion&gt;If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data acc...
    Rule High Severity
  • SRG-OS-000370-GPOS-00155

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.

    &lt;VulnDiscussion&gt;Utilizing an allowlist provides a configuration management method for allowing the execution of only authorized software. Usi...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows 10 systems must be maintained at a supported servicing level.

    &lt;VulnDiscussion&gt;Windows 10 is maintained by Microsoft at servicing levels for specific periods of time to support Windows as a Service. Syste...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Windows 10 system must use an anti-virus program.

    &lt;VulnDiscussion&gt;Malicious software can establish a base on individual desktops and servers. Employing an automated mechanism to detect this t...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • Local volumes must be formatted using NTFS.

    &lt;VulnDiscussion&gt;The ability to set access permissions and auditing is critical to maintaining the security and proper access controls of a sy...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Alternate operating systems must not be permitted on the same system.

    &lt;VulnDiscussion&gt;Allowing other operating systems to run on a secure system may allow security to be circumvented.&lt;/VulnDiscussion&gt;&lt;F...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • Non system-created file shares on a system must limit access to groups that require it.

    &lt;VulnDiscussion&gt;Shares which provide network access, should not typically exist on a workstation except for system-created administrative sha...
    Rule Medium Severity
  • SRG-OS-000118-GPOS-00060

    <GroupDescription></GroupDescription>
    Group
  • Unused accounts must be disabled or removed from the system after 35 days of inactivity.

    &lt;VulnDiscussion&gt;Outdated or unused accounts provide penetration points that may go undetected. Inactive accounts must be deleted if no longer...
    Rule Low Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • Only accounts responsible for the administration of a system must have Administrator rights on the system.

    &lt;VulnDiscussion&gt;An account that does not have Administrator duties must not have Administrator rights. Such rights would allow the account t...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Only accounts responsible for the backup operations must be members of the Backup Operators group.

    &lt;VulnDiscussion&gt;Backup Operators are able to read and write to any file in the system, regardless of the rights assigned to it. Backup and r...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Only authorized user accounts must be allowed to create or run virtual machines on Windows 10 systems.

    &lt;VulnDiscussion&gt;Allowing other operating systems to run on a secure system may allow users to circumvent security. For Hyper-V, preventing un...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Standard local user accounts must not exist on a system in a domain.

    &lt;VulnDiscussion&gt;To minimize potential points of attack, local user accounts, other than built-in accounts and local administrator accounts, m...
    Rule Low Severity
  • SRG-OS-000076-GPOS-00044

    <GroupDescription></GroupDescription>
    Group
  • Accounts must be configured to require password expiration.

    &lt;VulnDiscussion&gt;Passwords that do not expire increase exposure with a greater probability of being discovered or cracked.&lt;/VulnDiscussion&...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    <GroupDescription></GroupDescription>
    Group
  • Permissions for system files and directories must conform to minimum requirements.

    &lt;VulnDiscussion&gt;Changing the system's file and directory permissions allows the possibility of unauthorized and anonymous modification to the...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Internet Information System (IIS) or its subcomponents must not be installed on a workstation.

    &lt;VulnDiscussion&gt;Installation of Internet Information System (IIS) may allow unauthorized internet services to be hosted. Websites must only ...
    Rule High Severity
  • SRG-OS-000096-GPOS-00050

    <GroupDescription></GroupDescription>
    Group
  • Simple Network Management Protocol (SNMP) must not be installed on the system.

    &lt;VulnDiscussion&gt;Some protocols and services do not support required security features, such as encrypting passwords or traffic.&lt;/VulnDiscu...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Simple TCP/IP Services must not be installed on the system.

    &lt;VulnDiscussion&gt;Some protocols and services do not support required security features, such as encrypting passwords or traffic.&lt;/VulnDiscu...
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    <GroupDescription></GroupDescription>
    Group
  • The Telnet Client must not be installed on the system.

    &lt;VulnDiscussion&gt;Some protocols and services do not support required security features, such as encrypting passwords or traffic.&lt;/VulnDiscu...
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    <GroupDescription></GroupDescription>
    Group
  • The TFTP Client must not be installed on the system.

    &lt;VulnDiscussion&gt;Some protocols and services do not support required security features, such as encrypting passwords or traffic.&lt;/VulnDiscu...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules