I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The DoD Interoperability Root CA cross-certificates must be installed in the Untrusted Certificates Store on unclassified systems.
<VulnDiscussion>To ensure users do not experience denial of service when performing certificate-based authentication to DoD websites due to t...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The US DoD CCEB Interoperability Root CA cross-certificates must be installed in the Untrusted Certificates Store on unclassified systems.
<VulnDiscussion>To ensure users do not experience denial of service when performing certificate-based authentication to DoD websites due to t...Rule Medium Severity -
SRG-OS-000121-GPOS-00062
<GroupDescription></GroupDescription>Group -
Windows Server 2016 built-in guest account must be disabled.
<VulnDiscussion>A system faces an increased vulnerability threat if the built-in guest account is not disabled. This is a known account that ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Local accounts with blank passwords must be restricted to prevent access from the network.
<VulnDiscussion>An account without a password can allow unauthorized access to a system as only the username would be required. Password poli...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2016 built-in administrator account must be renamed.
<VulnDiscussion>The built-in administrator account is a well-known account subject to attack. Renaming this account to an unidentified name i...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2016 built-in guest account must be renamed.
<VulnDiscussion>The built-in guest account is a well-known user account on all Windows systems and, as initially installed, does not require ...Rule Medium Severity -
SRG-OS-000062-GPOS-00031
<GroupDescription></GroupDescription>Group -
Audit policy using subcategories must be enabled.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
The setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not al...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
The setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not al...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
The setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the ch...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.