III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Software certificate installation files must be removed from Windows 10.
<VulnDiscussion>Use of software certificates and their accompanying installation files for end users to access resources is less secure than ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
A host-based firewall must be installed and enabled on the system.
<VulnDiscussion>A firewall provides a line of defense against attack, allowing or blocking inbound and outbound connections based on a set of...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Inbound exceptions to the firewall on Windows 10 domain workstations must only allow authorized remote management hosts.
<VulnDiscussion>Allowing inbound access to domain workstations from other systems may allow lateral movement across systems if credentials ar...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
Data Execution Prevention (DEP) must be configured to at least OptOut.
<VulnDiscussion>Attackers are constantly looking for vulnerabilities in systems and applications. Data Execution Prevention (DEP) prevents ha...Rule High Severity -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
Structured Exception Handling Overwrite Protection (SEHOP) must be enabled.
<VulnDiscussion>Attackers are constantly looking for vulnerabilities in systems and applications. Structured Exception Handling Overwrite Pro...Rule High Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Windows PowerShell 2.0 feature must be disabled on the system.
<VulnDiscussion>Windows PowerShell 5.0 added advanced logging features which can provide additional detail when malware has been run on a sys...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Server Message Block (SMB) v1 protocol must be disabled on the system.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Secondary Logon service must be disabled on Windows 10.
<VulnDiscussion>The Secondary Logon service provides a means for entering alternate credentials, typically used to run commands with elevated...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Orphaned security identifiers (SIDs) must be removed from user rights on Windows 10.
<VulnDiscussion>Accounts or groups given rights on a system may show up as unresolved SIDs for various reasons including deletion of the acco...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Bluetooth must be turned off unless approved by the organization.
<VulnDiscussion>If not configured properly, Bluetooth may allow rogue devices to communicate with a system. If a rogue device is paired with ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Bluetooth must be turned off when not in use.
<VulnDiscussion>If not configured properly, Bluetooth may allow rogue devices to communicate with a system. If a rogue device is paired with ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The system must notify the user when a Bluetooth device attempts to connect.
<VulnDiscussion>If not configured properly, Bluetooth may allow rogue devices to communicate with a system. If a rogue device is paired with ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
<VulnDiscussion>Using applications that access the Internet or have potential Internet sources using administrative privileges exposes a syst...Rule High Severity -
SRG-OS-000185-GPOS-00079
<GroupDescription></GroupDescription>Group -
Windows 10 nonpersistent VM sessions must not exceed 24 hours.
<VulnDiscussion>For virtual desktop implementations (VDIs) where the virtual desktop instance is deleted or refreshed upon logoff, the organi...Rule Medium Severity -
SRG-OS-000329-GPOS-00128
<GroupDescription></GroupDescription>Group -
Windows 10 account lockout duration must be configured to 15 minutes or greater.
<VulnDiscussion>The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies th...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
The number of allowed bad logon attempts must be configured to 3 or less.
<VulnDiscussion>The account lockout feature, when enabled, prevents brute-force password attacks on the system. The higher this value is, th...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
The period of time before the bad logon counter is reset must be configured to 15 minutes.
<VulnDiscussion>The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
<GroupDescription></GroupDescription>Group -
The password history must be configured to 24 passwords remembered.
<VulnDiscussion>A system is more vulnerable to unauthorized access when system users recycle the same password several times without being re...Rule Medium Severity -
SRG-OS-000076-GPOS-00044
<GroupDescription></GroupDescription>Group -
The maximum password age must be configured to 60 days or less.
<VulnDiscussion>The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the passwords. Sch...Rule Medium Severity -
SRG-OS-000075-GPOS-00043
<GroupDescription></GroupDescription>Group -
The minimum password age must be configured to at least 1 day.
<VulnDiscussion>Permitting passwords to be changed in immediate succession within the same day allows users to cycle passwords through their ...Rule Medium Severity -
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
Passwords must, at a minimum, be 14 characters.
<VulnDiscussion>Information systems not protected with strong password schemes (including passwords of minimum length) provide the opportunit...Rule Medium Severity -
SRG-OS-000069-GPOS-00037
<GroupDescription></GroupDescription>Group -
The built-in Microsoft password complexity filter must be enabled.
<VulnDiscussion>The use of complex passwords increases their strength against guessing and brute-force attacks. This setting configures the ...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
<GroupDescription></GroupDescription>Group -
Reversible password encryption must be disabled.
<VulnDiscussion>Storing passwords using reversible encryption is essentially the same as storing clear-text versions of the passwords. For th...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.