Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000080-GPOS-00048

    Group
  • The Allow log on locally user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Allow log on locally" user right can log on interactively to a system.
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Back up files and directories user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Back up files and directories" user right can circumvent file and di...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Create a pagefile user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create a pagefile" user right can change the size of a pagefile, whi...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create global objects" user right can create objects that are availa...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Create permanent shared objects user right must not be assigned to any groups or accounts.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create permanent shared objects" user right could expose sensitive d...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Create symbolic links user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Create symbolic links" user right can create pointers to other objec...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Debug programs user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Debug programs" user right can attach a debugger to any process or t...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Force shutdown from a remote system user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Force shutdown from a remote system" user right can remotely shut do...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Generate security audits user right must only be assigned to Local Service and Network Service.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Generate security audits" user right specifies users and processes that can genera...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Impersonate a client after authentication" user right allows a program to imperson...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Increase scheduling priority user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Increase scheduling priority" user right can change a scheduling pri...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Load and unload device drivers user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Load and unload device drivers" user right allows a user to load device drivers dy...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Lock pages in memory user right must not be assigned to any groups or accounts.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Lock pages in memory" user right allows physical memory to be assigned to processe...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • The Manage auditing and security log user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Manage auditing and security log" user right can manage the security...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Modify firmware environment values user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Modify firmware environment values" user right can change hardware c...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Perform volume maintenance tasks user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Perform volume maintenance tasks" user right can manage volume and d...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Profile single process user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Profile single process" user right can monitor non-system processes ...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Create a token object user right must not be assigned to any groups or accounts.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Create a token object" user right allows a process to create an access token. This...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Restore files and directories user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Restore files and directories" user right can circumvent file and di...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Take ownership of files or other objects user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Take ownership of files or other objects" user right can take owners...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Windows Explorer Preview pane must be disabled for Windows Server 2016.

    A known vulnerability in Windows could allow the execution of malicious code by either opening a compromised document or viewing it in the Windows Preview pane. Organizations must disable the Wind...
    Rule Medium Severity
  • SRG-OS-000041-GPOS-00019

    Group
  • Windows Server 2016 must have PowerShell Transcription enabled.

    Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules