Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000425-GPOS-00189

    Group
  • Protection methods such as TLS, encrypted VPNs, or IPsec must be implemented if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.

    Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during pa...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The roles and features required by the system must be documented.

    Unnecessary roles and features increase the attack surface of a system. Limiting roles and features of a system to only those necessary reduces this potential. The standard installation option (pre...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • A host-based firewall must be installed and enabled on the system.

    A firewall provides a line of defense against attack, allowing or blocking inbound and outbound connections based on a set of rules.
    Rule Medium Severity
  • SRG-OS-000191-GPOS-00080

    Group
  • Windows Server 2016 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where Endpoint Security Solution (ESS) is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).

    Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the operating system or other system components may remain vulnerable to the exploits prese...
    Rule Medium Severity
  • SRG-OS-000002-GPOS-00002

    Group
  • Windows Server 2016 must automatically remove or disable temporary user accounts after 72 hours.

    If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To mitigate this risk, automated termination of al...
    Rule Medium Severity
  • SRG-OS-000123-GPOS-00064

    Group
  • Windows Server 2016 must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.

    Emergency administrator accounts are privileged accounts established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activatio...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Fax Server role must not be installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    Group
  • The Microsoft FTP service must not be installed unless required.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Peer Name Resolution Protocol must not be installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Simple TCP/IP Services must not be installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    Group
  • The Telnet Client must not be installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The TFTP Client must not be installed.

    Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption or may provide unauthorized access to the system.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Server Message Block (SMB) v1 protocol must be uninstalled.

    SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks and is not FIPS compliant.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.

    SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks as well as not being FIPS compliant.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.

    SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks as well as not being FIPS compliant.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Windows PowerShell 2.0 must not be installed.

    Windows PowerShell 5.0 added advanced logging features that can provide additional detail when malware has been run on a system. Disabling the Windows PowerShell 2.0 mitigates against a downgrade a...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • FTP servers must be configured to prevent anonymous logons.

    The FTP service allows remote users to access shared files and directories. Allowing anonymous FTP connections makes user auditing difficult. Using accounts that have administrator privileges to l...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • FTP servers must be configured to prevent access to the system drive.

    The FTP service allows remote users to access shared files and directories that could provide access to system resources and compromise the system, especially if the user can gain access to the roo...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    Group
  • The time service must synchronize with an appropriate DoD time source.

    The Windows Time Service controls time synchronization settings. Time synchronization is essential for authentication and auditing purposes. If the Windows Time Service is used, it must synchronize...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Orphaned security identifiers (SIDs) must be removed from user rights on Windows 2016.

    Accounts or groups given rights on a system may show up as unresolved SIDs for various reasons including deletion of the accounts or groups. If the account or group objects are reanimated, there i...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Secure Boot must be enabled on Windows Server 2016 systems.

    Secure Boot is a standard that ensures systems boot only to a trusted operating system. Secure Boot is required to support additional security features in Windows Server 2016, including Virtualizat...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows 2016 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.

    UEFI provides additional security features in comparison to legacy BIOS firmware, including Secure Boot. UEFI is required to support additional security features in Windows Server 2016, including V...
    Rule Low Severity
  • SRG-OS-000329-GPOS-00128

    Group
  • Windows 2016 account lockout duration must be configured to 15 minutes or greater.

    The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the period of time that an account will remain locked after the specified nu...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • Windows Server 2016 must have the number of allowed bad logon attempts configured to three or less.

    The account lockout feature, when enabled, prevents brute-force password attacks on the system. The higher this value is, the less effective the account lockout feature will be in protecting the lo...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • Windows Server 2016 must have the period of time before the bad logon counter is reset configured to 15 minutes or greater.

    The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the period of time that must pass after failed logon attempts before the cou...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules