Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000066-GPOS-00034

    Group
  • Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).

    A PKI implementation depends on the practices established by the Certificate Authority (CA) to ensure the implementation is secure. Without proper practices, the certificates issued by a CA have li...
    Rule High Severity
  • SRG-OS-000066-GPOS-00034

    Group
  • PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA).

    A PKI implementation depends on the practices established by the Certificate Authority (CA) to ensure the implementation is secure. Without proper practices, the certificates issued by a CA have li...
    Rule High Severity
  • SRG-OS-000105-GPOS-00052

    Group
  • Active Directory user accounts, including administrators, must be configured to require the use of a Common Access Card (CAC), Personal Identity Verification (PIV)-compliant hardware token, or Alternate Logon Token (ALT) for user authentication.

    Smart cards such as the CAC support a two-factor authentication technique. This provides a higher level of trust in the asserted identity than use of the username and password for authentication. ...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Domain controllers must require LDAP access signing.

    Unsigned network traffic is susceptible to man-in-the-middle attacks, where an intruder captures packets between the server and the client and modifies them before forwarding them to the client. In...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Domain controllers must be configured to allow reset of machine account passwords.

    Enabling this setting on all domain controllers in a domain prevents domain members from changing their computer account passwords. If these passwords are weak or compromised, the inability to chan...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access this computer from the network" right may access resources on...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Add workstations to domain user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Add workstations to domain" right may add computers to a domain. Thi...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Allow log on through Remote Desktop Services" user right can access ...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny access to this computer from the network" user right defines the accounts tha...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a batch job" user right defines accounts that are prevented from lo...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules