Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000125-GPOS-00065

    Group
  • The Windows Remote Management (WinRM) service must not use Basic authentication.

    Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.
    Rule High Severity
  • SRG-OS-000393-GPOS-00173

    Group
  • The Windows Remote Management (WinRM) service must not allow unencrypted traffic.

    Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connections must be encrypted to prevent this. Satisfies: SRG-OS-000393-GPOS-0017...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • The Windows Remote Management (WinRM) service must not store RunAs credentials.

    Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Windows Remote Management will prevent them from being used with plug-ins. S...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • Only administrators responsible for the domain controller must have Administrator rights on the system.

    An account that does not have Administrator duties must not have Administrator rights. Such rights would allow the account to bypass or modify required security restrictions on that machine and mak...
    Rule High Severity
  • SRG-OS-000112-GPOS-00057

    Group
  • Kerberos user logon restrictions must be enforced.

    This policy setting determines whether the Kerberos Key Distribution Center (KDC) validates every request for a session ticket against the user rights policy of the target computer. The policy is e...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    Group
  • The Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.

    This setting determines the maximum amount of time (in minutes) that a granted session ticket can be used to access a particular service. Session tickets are used only to authenticate new connectio...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    Group
  • The Kerberos user ticket lifetime must be limited to 10 hours or less.

    In Kerberos, there are two types of tickets: Ticket Granting Tickets (TGTs) and Service Tickets. Kerberos tickets have a limited lifetime so the time an attacker has to implement an attack is limit...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    Group
  • The Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.

    This setting determines the period of time (in days) during which a user's Ticket Granting Ticket (TGT) may be renewed. This security configuration limits the amount of time an attacker has to crac...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    Group
  • The computer clock synchronization tolerance must be limited to 5 minutes or less.

    This setting determines the maximum time difference (in minutes) that Kerberos will tolerate between the time on a client's clock and the time on a server's clock while still considering the two cl...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • Permissions on the Active Directory data files must only allow System and Administrators access.

    Improper access permissions for directory data-related files could allow unauthorized users to read, modify, or delete directory data or audit trails.
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules