II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000066-GPOS-00034
Group -
The DoD Interoperability Root CA cross-certificates must be installed in the Untrusted Certificates Store on unclassified systems.
To ensure users do not experience denial of service when performing certificate-based authentication to DoD websites due to the system chaining to a root other than DoD Root CAs, the DoD Interopera...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
Group -
The US DoD CCEB Interoperability Root CA cross-certificates must be installed in the Untrusted Certificates Store on unclassified systems.
To ensure users do not experience denial of service when performing certificate-based authentication to DoD websites due to the system chaining to a root other than DoD Root CAs, the US DoD CCEB In...Rule Medium Severity -
SRG-OS-000121-GPOS-00062
Group -
Windows Server 2016 built-in guest account must be disabled.
A system faces an increased vulnerability threat if the built-in guest account is not disabled. This is a known account that exists on all Windows systems and cannot be deleted. This account is ini...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Local accounts with blank passwords must be restricted to prevent access from the network.
An account without a password can allow unauthorized access to a system as only the username would be required. Password policies should prevent accounts with blank passwords from existing on a sys...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2016 built-in administrator account must be renamed.
The built-in administrator account is a well-known account subject to attack. Renaming this account to an unidentified name improves the protection of this account and the system.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2016 built-in guest account must be renamed.
The built-in guest account is a well-known user account on all Windows systems and, as initially installed, does not require a password. This can allow access to system resources by unauthorized us...Rule Medium Severity -
SRG-OS-000062-GPOS-00031
Group -
Audit policy using subcategories must be enabled.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
The setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not all information is encrypted. If this policy is enabled, outgoing secure c...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
The setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.
Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not all information is encrypted. If this policy is enabled, outgoing secure c...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
The setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the channel is not integrity checked. If this policy is enabled, outgoing secu...Rule Medium Severity -
SRG-OS-000379-GPOS-00164
Group -
The computer account password must not be prevented from being reset.
Computer account passwords are changed automatically on a regular basis. Disabling automatic password changes can make the system more vulnerable to malicious access. Frequent password changes can ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The maximum age for machine account passwords must be configured to 30 days or less.
Computer account passwords are changed automatically on a regular basis. This setting controls the maximum password age that a machine account may have. This must be set to no more than 30 days, en...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
Windows Server 2016 must be configured to require a strong session key.
A computer connecting to a domain controller will establish a secure channel. The secure channel connection may be subject to compromise, such as hijacking or eavesdropping, if strong session keys ...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
Group -
The machine inactivity limit must be set to 15 minutes, locking the system with the screen saver.
Unattended systems are susceptible to unauthorized use and should be locked when unattended. The screen saver should be set at a maximum of 15 minutes and be password protected. This protects criti...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
Group -
The required legal notice must be configured to display before console logon.
Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access to system resources. Satisfies: SRG-OS-000023-GPOS-00006, SRG-OS-00002...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
Group -
The Windows dialog box title for the legal banner must be configured with the appropriate text.
Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access to system resources. Satisfies: SRG-OS-000023-GPOS-00006, SRG-OS-00022...Rule Low Severity -
SRG-OS-000480-GPOS-00227
Group -
The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
Unattended systems are susceptible to unauthorized use and must be locked. Configuring a system to lock when a smart card is removed will ensure the system is inaccessible when unattended.Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
The setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.
The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB ...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
The setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.
The server message block (SMB) protocol provides the basis for many network operations. If this policy is enabled, the SMB client will request packet signing when communicating with an SMB server t...Rule Medium Severity -
SRG-OS-000074-GPOS-00042
Group -
Unencrypted passwords must not be sent to third-party Server Message Block (SMB) servers.
Some non-Microsoft SMB servers only support unencrypted (plain-text) password authentication. Sending plain-text passwords across the network when authenticating to an SMB server reduces the overal...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
The setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.
The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB ...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
The setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.
The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Anonymous SID/Name translation must not be allowed.
Allowing anonymous SID/Name translation can provide sensitive information for accessing a system. Only authorized users must be able to perform such translations.Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
Anonymous enumeration of Security Account Manager (SAM) accounts must not be allowed.
Anonymous enumeration of SAM accounts allows anonymous logon users (null session connections) to list all accounts names, thus providing a list of potential points to attack the system.Rule High Severity -
SRG-OS-000138-GPOS-00069
Group -
Anonymous enumeration of shares must not be allowed.
Allowing anonymous logon users (null session connections) to list all account names and enumerate all shared resources can provide a map of potential points to attack the system.Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.