Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • Insecure logons to an SMB server must be disabled.

    Insecure guest logons allow unauthenticated access to shared folders. Shared resources on a system must require authentication to establish proper access.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Hardened UNC paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.

    Additional security requirements are applied to Universal Naming Convention (UNC) paths specified in hardened UNC paths before allowing access to them. This aids in preventing tampering with or spo...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    Group
  • Command line data must be included in process creation events.

    Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2016 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.

    Virtualization-based security (VBS) provides the platform for the additional security features Credential Guard and virtualization-based protection of code integrity. Secure Boot is the minimum sec...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.

    Compromised boot drivers can introduce malware prior to protection mechanisms that load after initialization. The Early Launch Antimalware driver can limit allowed drivers based on classifications ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Group Policy objects must be reprocessed even if they have not changed.

    Registry entries for group policy settings can potentially be changed from the required configuration. This could occur as part of troubleshooting or by a malicious process on a compromised system....
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Downloading print driver packages over HTTP must be prevented.

    Some features may communicate with the vendor, sending system information or downloading data or components for the feature. Turning off this capability will prevent potentially sensitive informati...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Printing over HTTP must be prevented.

    Some features may communicate with the vendor, sending system information or downloading data or components for the feature. Turning off this capability will prevent potentially sensitive informati...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The network selection user interface (UI) must not be displayed on the logon screen.

    Enabling interaction with the network selection UI allows users to change connections to available networks without signing in to Windows.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Users must be prompted to authenticate when the system wakes from sleep (on battery).

    A system that does not require authentication when resuming from sleep may provide access to unauthorized users. Authentication must always be required when accessing a system. This setting ensures...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules