Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must limit the caching of logon credentials to four or less on domain-joined member servers.

    &lt;VulnDiscussion&gt;The default Windows configuration caches the last logon credentials for users who log on interactively to a system. This feat...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be running Credential Guard on domain-joined member servers.

    &lt;VulnDiscussion&gt;Credential Guard uses virtualization-based security to protect data that could be used in credential theft attacks if comprom...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must prevent local accounts with blank passwords from being used from the network.

    &lt;VulnDiscussion&gt;An account without a password can allow unauthorized access to a system as only the username would be required. Password poli...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 built-in administrator account must be renamed.

    &lt;VulnDiscussion&gt;The built-in administrator account is a well-known account subject to attack. Renaming this account to an unidentified name i...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 built-in guest account must be renamed.

    &lt;VulnDiscussion&gt;The built-in guest account is a well-known user account on all Windows systems and, as initially installed, does not require ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 maximum age for machine account passwords must be configured to 30 days or less.

    &lt;VulnDiscussion&gt;Computer account passwords are changed automatically on a regular basis. This setting controls the maximum password age that ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 Smart Card removal option must be configured to Force Logoff or Lock Workstation.

    &lt;VulnDiscussion&gt;Unattended systems are susceptible to unauthorized use and must be locked. Configuring a system to lock when a smart card is ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must not allow anonymous SID/Name translation.

    &lt;VulnDiscussion&gt;Allowing anonymous SID/Name translation can provide sensitive information for accessing a system. Only authorized users must ...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.

    &lt;VulnDiscussion&gt;Anonymous enumeration of SAM accounts allows anonymous logon users (null session connections) to list all accounts names, thu...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2019 must be configured to prevent anonymous users from having the same permissions as the Everyone group.

    &lt;VulnDiscussion&gt;Access by anonymous users must be restricted. If this setting is enabled, anonymous users have the same rights and permission...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules