III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000362-GPOS-00149
<GroupDescription></GroupDescription>Group -
Windows Server 2019 must disable the Windows Installer Always install with elevated privileges option.
<VulnDiscussion>Standard user accounts must not be granted elevated privileges. Enabling Windows Installer to elevate privileges when install...Rule High Severity -
SRG-OS-000363-GPOS-00150
<GroupDescription></GroupDescription>Group -
Windows Server 2019 system files must be monitored for unauthorized changes.
<VulnDiscussion>Monitoring system files for changes against a baseline on a regular basis may help detect the possible introduction of malici...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Autoplay must be turned off for non-volume devices.
<VulnDiscussion>Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon as media ...Rule High Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands.
<VulnDiscussion>Allowing AutoRun commands to execute may introduce malicious code to a system. Configuring this setting prevents AutoRun comm...Rule High Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
Windows Server 2019 AutoPlay must be disabled for all drives.
<VulnDiscussion>Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon media is ...Rule High Severity -
SRG-OS-000370-GPOS-00155
<GroupDescription></GroupDescription>Group -
Windows Server 2019 must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
<VulnDiscussion>Using an allowlist provides a configuration management method to allow the execution of only authorized software. Using only ...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
<GroupDescription></GroupDescription>Group -
Windows Server 2019 must not save passwords in the Remote Desktop Client.
<VulnDiscussion>Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to anoth...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Remote Desktop Services must always prompt a client for passwords upon connection.
<VulnDiscussion>This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Disa...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Windows Remote Management (WinRM) service must not store RunAs credentials.
<VulnDiscussion>Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Windo...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
<GroupDescription></GroupDescription>Group -
Windows Server 2019 User Account Control approval mode for the built-in Administrator must be enabled.
<VulnDiscussion>User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative account...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
<GroupDescription></GroupDescription>Group -
Windows Server 2019 User Account Control must automatically deny standard user requests for elevation.
<VulnDiscussion>User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative account...Rule Medium Severity -
SRG-OS-000373-GPOS-00157
<GroupDescription></GroupDescription>Group -
Windows Server 2019 User Account Control must run all administrators in Admin Approval Mode, enabling UAC.
<VulnDiscussion>User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative account...Rule Medium Severity -
SRG-OS-000379-GPOS-00164
<GroupDescription></GroupDescription>Group -
Windows Server 2019 must restrict unauthenticated Remote Procedure Call (RPC) clients from connecting to the RPC server on domain-joined member servers and standalone or nondomain-joined systems.
<VulnDiscussion>Unauthenticated RPC clients may allow anonymous access to sensitive information. Configuring RPC to restrict unauthenticated ...Rule Medium Severity -
SRG-OS-000379-GPOS-00164
<GroupDescription></GroupDescription>Group -
Windows Server 2019 computer account password must not be prevented from being reset.
<VulnDiscussion>Computer account passwords are changed automatically on a regular basis. Disabling automatic password changes can make the sy...Rule Medium Severity -
SRG-OS-000393-GPOS-00173
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Windows Remote Management (WinRM) client must not allow unencrypted traffic.
<VulnDiscussion>Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connection...Rule Medium Severity -
SRG-OS-000393-GPOS-00173
<GroupDescription></GroupDescription>Group -
Windows Server 2019 Windows Remote Management (WinRM) service must not allow unencrypted traffic.
<VulnDiscussion>Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connection...Rule Medium Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
<VulnDiscussion>Directory data that is not appropriately encrypted is subject to compromise. Commercial-grade encryption does not provide ade...Rule Medium Severity -
SRG-OS-000420-GPOS-00186
<GroupDescription></GroupDescription>Group -
Windows Server 2019 must be configured to ignore NetBIOS name release requests except from WINS servers.
<VulnDiscussion>Configuring the system to ignore name release requests, except from WINS servers, prevents a denial of service (DoS) attack. ...Rule Low Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Windows Server 2019 domain controllers must require LDAP access signing.
<VulnDiscussion>Unsigned network traffic is susceptible to man-in-the-middle attacks, where an intruder captures packets between the server a...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Windows Server 2019 setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not al...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Windows Server 2019 setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not al...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Windows Server 2019 setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
<VulnDiscussion>Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the ch...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Windows Server 2019 must be configured to require a strong session key.
<VulnDiscussion>A computer connecting to a domain controller will establish a secure channel. The secure channel connection may be subject to...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Windows Server 2019 setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.
<VulnDiscussion>The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in p...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
Windows Server 2019 setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.
<VulnDiscussion>The server message block (SMB) protocol provides the basis for many network operations. If this policy is enabled, the SMB cl...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.