I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2019 domain controllers must run on a machine dedicated to that function.
<VulnDiscussion>Executing application servers on the same host machine with a directory server may substantially weaken the security of the d...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2019 local users on domain-joined member servers must not be enumerated.
<VulnDiscussion>The username is one part of logon credentials that could be used to gain access to a system. Preventing the enumeration of us...Rule Medium Severity -
SRG-OS-000096-GPOS-00050
<GroupDescription></GroupDescription>Group -
Windows Server 2019 must not have the Microsoft FTP service installed unless required by the organization.
<VulnDiscussion>Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authe...Rule Medium Severity -
SRG-OS-000096-GPOS-00050
<GroupDescription></GroupDescription>Group -
Windows Server 2019 must not have the Telnet Client installed.
<VulnDiscussion>Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authe...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
Windows Server 2019 shared user accounts must not be permitted.
<VulnDiscussion>Shared accounts (accounts where two or more people log on with the same user identification) do not provide adequate identifi...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
Windows Server 2019 accounts must require passwords.
<VulnDiscussion>The lack of password protection enables anyone to gain access to the information system, which opens a backdoor opportunity f...Rule Medium Severity -
SRG-OS-000105-GPOS-00052
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Active Directory user accounts, including administrators, must be configured to require the use of a Common Access Card (CAC), Personal Identity Verification (PIV)-compliant hardware token, or Alternate Logon Token (ALT) for user authentication.
<VulnDiscussion>Smart cards such as the CAC support a two-factor authentication technique. This provides a higher level of trust in the asser...Rule Medium Severity -
SRG-OS-000112-GPOS-00057
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Kerberos user logon restrictions must be enforced.
<VulnDiscussion>This policy setting determines whether the Kerberos Key Distribution Center (KDC) validates every request for a session ticke...Rule Medium Severity -
SRG-OS-000112-GPOS-00057
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.
<VulnDiscussion>This setting determines the maximum amount of time (in minutes) that a granted session ticket can be used to access a particu...Rule Medium Severity -
SRG-OS-000112-GPOS-00057
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Kerberos user ticket lifetime must be limited to 10 hours or less.
<VulnDiscussion>In Kerberos, there are two types of tickets: Ticket Granting Tickets (TGTs) and Service Tickets. Kerberos tickets have a limi...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.