Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000080-GPOS-00048

    Group
  • The Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access this computer from the network" right may access resources on...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Add workstations to domain user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Add workstations to domain" right may add computers to a domain. Thi...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Allow log on through Remote Desktop Services" user right can access ...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny access to this computer from the network" user right defines the accounts tha...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a batch job" user right defines accounts that are prevented from lo...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a service" user right defines accounts that are denied logon as a s...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on locally" user right defines accounts that are prevented from logging o...
    Rule Medium Severity
  • SRG-OS-000297-GPOS-00115

    Group
  • The Deny log on through Remote Desktop Services user right on domain controllers must be configured to prevent unauthenticated access.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on through Remote Desktop Services" user right defines the accounts that ...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Enable computer and user accounts to be trusted for delegation user right must only be assigned to the Administrators group on domain controllers.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Enable computer and user accounts to be trusted for delegation" user right allows ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The password for the krbtgt account on a domain must be reset at least every 180 days.

    The krbtgt account acts as a service account for the Kerberos Key Distribution Center (KDC) service. The account and password are created when a domain is created and the password is typically not ...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • Only administrators responsible for the member server or standalone or nondomain-joined system must have Administrator rights on the system.

    An account that does not have Administrator duties must not have Administrator rights. Such rights would allow the account to bypass or modify required security restrictions on that machine and mak...
    Rule High Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.

    A compromised local administrator account can provide means for an attacker to move laterally between domain systems. With User Account Control enabled, filtering the privileged token for local ad...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • Local users on domain-joined computers must not be enumerated.

    The username is one part of logon credentials that could be used to gain access to a system. Preventing the enumeration of users limits this information to authorized personnel.
    Rule Medium Severity
  • SRG-OS-000379-GPOS-00164

    Group
  • Unauthenticated Remote Procedure Call (RPC) clients must be restricted from connecting to the RPC server.

    Unauthenticated RPC clients may allow anonymous access to sensitive information. Configuring RPC to restrict unauthenticated RPC clients from connecting to the RPC server will prevent anonymous con...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Caching of logon credentials must be limited.

    The default Windows configuration caches the last logon credentials for users who log on interactively to a system. This feature is provided for system availability reasons, such as the user's mach...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2016 must be running Credential Guard on domain-joined member servers.

    Credential Guard uses virtualization-based security to protect data that could be used in credential theft attacks if compromised. This authentication information, which was stored in the Local Sec...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • Remote calls to the Security Account Manager (SAM) must be restricted to Administrators.

    The Windows Security Account Manager (SAM) stores users' passwords. Restricting Remote Procedure Call (RPC) connections to the SAM to Administrators helps protect those credentials.
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on member servers.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Access this computer from the network" user right may access resourc...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The "Deny access to this computer from the network" user right on member servers must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and from unauthenticated access on all systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny access to this computer from the network" user right defines the accounts tha...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The "Deny log on as a batch job" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a batch job" user right defines accounts that are prevented from lo...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The "Deny log on as a service" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems. No other groups or accounts must be assigned this right.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a service" user right defines accounts that are denied logon as a s...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The "Deny log on locally" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on locally" user right defines accounts that are prevented from logging o...
    Rule Medium Severity
  • SRG-OS-000297-GPOS-00115

    Group
  • The "Deny log on through Remote Desktop Services" user right on member servers must be configured to prevent access from highly privileged domain accounts and all local accounts on domain systems and from unauthenticated access on all systems.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on through Remote Desktop Services" user right defines the accounts that ...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The "Enable computer and user accounts to be trusted for delegation" user right must not be assigned to any groups or accounts on member servers.

    Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Enable computer and user accounts to be trusted for delegation" user right allows ...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    Group
  • The DoD Root CA certificates must be installed in the Trusted Root Store.

    To ensure secure DoD websites and DoD-signed code are properly validated, the system must trust the DoD Root Certificate Authorities (CAs). The DoD root certificates will ensure that the trust chai...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules