Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000120-GPOS-00061

    Group
  • Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.

    Certain encryption types are no longer considered secure. The DES and RC4 encryption suites must not be used for Kerberos encryption. Note: Organizations with domain controllers running earlier ve...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • Windows Server 2016 must be configured to prevent the storage of the LAN Manager hash of passwords.

    The LAN Manager hash uses a weak encryption algorithm and there are several tools available that use this hash to retrieve account passwords. This setting controls whether a LAN Manager hash of the...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The LAN Manager authentication level must be set to send NTLMv2 response only and to refuse LM and NTLM.

    The Kerberos v5 authentication protocol is the default for authentication of users who are logging on to domain accounts. NTLM, which is less secure, is retained in later Windows versions for compa...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2016 must be configured to at least negotiate signing for LDAP client signing.

    This setting controls the signing requirements for LDAP clients. This must be set to "Negotiate signing" or "Require signing", depending on the environment and type of LDAP server in use.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.

    Microsoft has implemented a variety of security support providers for use with Remote Procedure Call (RPC) sessions. All of the options must be enabled to ensure the maximum security level.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.

    Microsoft has implemented a variety of security support providers for use with Remote Procedure Call (RPC) sessions. All of the options must be enabled to ensure the maximum security level.
    Rule Medium Severity
  • SRG-OS-000067-GPOS-00035

    Group
  • Users must be required to enter a password to access private keys stored on the computer.

    If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    Group
  • Windows Server 2016 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.

    This setting ensures the system uses algorithms that are FIPS-compliant for encryption, hashing, and signing. FIPS-compliant algorithms meet specific standards established by the U.S. Government an...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The default permissions of global system objects must be strengthened.

    Windows systems maintain a global list of shared system resources such as DOS device names, mutexes, and semaphores. Each type of object is created with a default Discretionary Access Control List ...
    Rule Low Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • User Account Control approval mode for the built-in Administrator must be enabled.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures the built-in Administrator...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules