II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000095-GPOS-00049
Group -
Basic authentication for RSS feeds over HTTP must not be used.
Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
Indexing of encrypted files must be turned off.
Indexing of encrypted files may expose sensitive data. This setting prevents encrypted files from being indexed.Rule Medium Severity -
SRG-OS-000362-GPOS-00149
Group -
Users must be prevented from changing installation options.
Installation options for applications are typically controlled by administrators. This setting prevents users from changing installation options that may bypass security features.Rule Medium Severity -
SRG-OS-000362-GPOS-00149
Group -
The Windows Installer Always install with elevated privileges option must be disabled.
Standard user accounts must not be granted elevated privileges. Enabling Windows Installer to elevate privileges when installing applications can allow malicious persons and applications to gain fu...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
Users must be notified if a web-based program attempts to install software.
Web-based programs may attempt to install malicious software on a system. Ensuring users are notified if a web-based program attempts to install software allows them to refuse the installation.Rule Medium Severity -
SRG-OS-000480-GPOS-00229
Group -
Automatically signing in the last interactive user after a system-initiated restart must be disabled.
Windows can be configured to automatically sign the user back in after a Windows Update restart. Some protections are in place to help ensure this is done in a secure fashion; however, disabling th...Rule Medium Severity -
SRG-OS-000042-GPOS-00020
Group -
PowerShell script block logging must be enabled.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
Group -
The Windows Remote Management (WinRM) client must not use Basic authentication.
Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.Rule High Severity -
SRG-OS-000393-GPOS-00173
Group -
The Windows Remote Management (WinRM) client must not allow unencrypted traffic.
Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connections must be encrypted to prevent this. Satisfies: SRG-OS-000393-GPOS-0017...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
Group -
The Windows Remote Management (WinRM) client must not use Digest authentication.
Digest authentication is not as strong as other options and may be subject to man-in-the-middle attacks. Disallowing Digest authentication will reduce this potential.Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.