II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000470-GPOS-00214
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit Logon/Logoff - Special Logon successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000470-GPOS-00214
<GroupDescription></GroupDescription>Group -
Windows 2016 must be configured to audit Object Access - Other Object Access Events successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000470-GPOS-00214
<GroupDescription></GroupDescription>Group -
Windows 2016 must be configured to audit Object Access - Other Object Access Events failures.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000474-GPOS-00219
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit Object Access - Removable Storage successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000474-GPOS-00219
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit Object Access - Removable Storage failures.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change failures.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit Policy Change - Authentication Policy Change successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit Policy Change - Authorization Policy Change successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit System - IPsec Driver successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit System - IPsec Driver failures.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit System - Other System Events successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit System - Other System Events failures.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit System - Security State Change successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit System - Security System Extension successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit System - System Integrity successes.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to audit System - System Integrity failures.
<VulnDiscussion>Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The display of slide shows on the lock screen must be disabled.
<VulnDiscussion>Slide shows that are displayed on the lock screen could display sensitive information to unauthorized personnel. Turning off ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
WDigest Authentication must be disabled on Windows Server 2016.
<VulnDiscussion>When the WDigest Authentication protocol is enabled, plain-text passwords are stored in the Local Security Authority Subsyste...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
<VulnDiscussion>Configuring the system to disable IPv6 source routing protects against spoofing.</VulnDiscussion><FalsePositives>...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
<VulnDiscussion>Configuring the system to disable IP source routing protects against spoofing.</VulnDiscussion><FalsePositives>&l...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
<VulnDiscussion>Allowing ICMP redirect of routes can lead to traffic not being routed properly. When disabled, this forces ICMP to be routed ...Rule Low Severity -
SRG-OS-000420-GPOS-00186
<GroupDescription></GroupDescription>Group -
Windows Server 2016 must be configured to ignore NetBIOS name release requests except from WINS servers.
<VulnDiscussion>Configuring the system to ignore name release requests, except from WINS servers, prevents a denial of service (DoS) attack. ...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.