Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.

    Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently introduced during a session that has been granted full privileges.
    Rule High Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • Passwords for the built-in Administrator account must be changed at least every 60 days.

    The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the password. The built-in Administrator account is not generally used and its password no...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.

    Using applications that access the Internet or have potential Internet sources using administrative privileges exposes a system to compromise. If a flaw in an application is exploited while running...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.

    Backup Operators are able to read and write to any file in the system, regardless of the rights assigned to it. Backup and restore rights permit users to circumvent the file access restrictions pre...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • Manually managed application account passwords must be at least 14 characters in length.

    Application/service account passwords must be of sufficient length to prevent being easily cracked. Application/service accounts that are manually managed must have passwords at least 14 characters...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.

    Setting application account passwords to expire may cause applications to stop functioning. However, not changing them on a regular basis exposes them to attack. If managed service accounts are use...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • Shared user accounts must not be permitted on the system.

    Shared accounts (accounts where two or more people log on with the same user identification) do not provide adequate identification and authentication. There is no way to provide for nonrepudiation...
    Rule Medium Severity
  • SRG-OS-000370-GPOS-00155

    Group
  • Windows Server 2016 must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.

    Using an allowlist provides a configuration management method to allow the execution of only authorized software. Using only authorized software decreases risk by limiting the number of potential v...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2016 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.

    Credential Guard uses virtualization-based security to protect data that could be used in credential theft attacks if compromised. A number of system requirements must be met for Credential Guard t...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Systems must be maintained at a supported servicing level.

    Systems at unsupported servicing levels will not receive security updates for new vulnerabilities, which leave them subject to exploitation. Systems must be maintained at a servicing level supporte...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Windows Server 2016 system must use an anti-virus program.

    Malicious software can establish a base on individual desktops and servers. Employing an automated mechanism to detect this type of software will aid in elimination of the software from the operati...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Servers must have a host-based intrusion detection or prevention system.

    A properly configured Host-based Intrusion Detection System (HIDS) or Host-based Intrusion Prevention System (HIPS) provides another level of defense against unauthorized access to critical servers...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Local volumes must use a format that supports NTFS attributes.

    The ability to set access permissions and auditing is critical to maintaining the security and proper access controls of a system. To support this, volumes must be formatted using a file system tha...
    Rule High Severity
  • SRG-OS-000312-GPOS-00122

    Group
  • Permissions for the system drive root directory (usually C:\) must conform to minimum requirements.

    Changing the system's file and directory permissions allows the possibility of unauthorized and anonymous modification to the operating system and installed applications. The default permissions a...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    Group
  • Permissions for program file directories must conform to minimum requirements.

    Changing the system's file and directory permissions allows the possibility of unauthorized and anonymous modification to the operating system and installed applications. The default permissions a...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    Group
  • Permissions for the Windows installation directory must conform to minimum requirements.

    Changing the system's file and directory permissions allows the possibility of unauthorized and anonymous modification to the operating system and installed applications. The default permissions a...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained.

    The registry is integral to the function, security, and stability of the Windows system. Changing the system's registry permissions allows the possibility of unauthorized and anonymous modification...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Non-administrative accounts or groups must only have print permissions on printer shares.

    Windows shares are a means by which files, folders, printers, and other resources can be published for network users to access. Improper configuration can permit access to devices and data beyond a...
    Rule Low Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • Outdated or unused accounts must be removed from the system or disabled.

    Outdated or unused accounts provide penetration points that may go undetected. Inactive accounts must be deleted if no longer necessary or, if still required, disabled until needed. Satisfies: SRG...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • Windows Server 2016 accounts must require passwords.

    The lack of password protection enables anyone to gain access to the information system, which opens a backdoor opportunity for intruders to compromise the system as well as other resources. Accoun...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • Passwords must be configured to expire.

    Passwords that do not expire or are reused increase the exposure of a password with greater probability of being discovered or cracked.
    Rule Medium Severity
  • SRG-OS-000363-GPOS-00150

    Group
  • System files must be monitored for unauthorized changes.

    Monitoring system files for changes against a baseline on a regular basis may help detect the possible introduction of malicious code on a system.
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • Non-system-created file shares on a system must limit access to groups that require it.

    Shares on a system provide network access. To prevent exposing sensitive information, where shares are necessary, permissions must be reconfigured to give the minimum access to accounts that requir...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Software certificate installation files must be removed from Windows Server 2016.

    Use of software certificates and their accompanying installation files for end users to access resources is less secure than the use of hardware-based certificates.
    Rule Medium Severity
  • SRG-OS-000185-GPOS-00079

    Group
  • Systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.

    This requirement addresses protection of user-generated data as well as operating system-specific configuration data. Organizations may choose to employ different mechanisms to achieve confidential...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules