I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000123-GPOS-00064
<GroupDescription></GroupDescription>Group -
Windows Server 2019 must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.
<VulnDiscussion>Emergency administrator accounts are privileged accounts established in response to crisis situations where the need for rapi...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Windows Remote Management (WinRM) client must not use Basic authentication.
<VulnDiscussion>Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will...Rule High Severity -
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Windows Remote Management (WinRM) client must not use Digest authentication.
<VulnDiscussion>Digest authentication is not as strong as other options and may be subject to man-in-the-middle attacks. Disallowing Digest a...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Windows Remote Management (WinRM) service must not use Basic authentication.
<VulnDiscussion>Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will...Rule High Severity -
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
Windows Server 2019 administrator accounts must not be enumerated during elevation.
<VulnDiscussion>Enumeration of administrator accounts when elevating can provide part of the logon information to an unauthorized user. This ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.