Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000125-GPOS-00065

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 Windows Remote Management (WinRM) client must not use Digest authentication.

    &lt;VulnDiscussion&gt;Digest authentication is not as strong as other options and may be subject to man-in-the-middle attacks. Disallowing Digest a...
    Rule Medium Severity
  • SRG-OS-000125-GPOS-00065

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 Windows Remote Management (WinRM) service must not use Basic authentication.

    &lt;VulnDiscussion&gt;Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will...
    Rule High Severity
  • SRG-OS-000393-GPOS-00173

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 Windows Remote Management (WinRM) service must not allow unencrypted traffic.

    &lt;VulnDiscussion&gt;Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connection...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 Windows Remote Management (WinRM) service must not store RunAs credentials.

    &lt;VulnDiscussion&gt;Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Windo...
    Rule Medium Severity
  • SRG-OS-000041-GPOS-00019

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 must have PowerShell Transcription enabled.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 must only allow administrators responsible for the domain controller to have Administrator rights on the system.

    &lt;VulnDiscussion&gt;An account that does not have Administrator duties must not have Administrator rights. Such rights would allow the account to...
    Rule High Severity
  • SRG-OS-000112-GPOS-00057

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 Kerberos user logon restrictions must be enforced.

    &lt;VulnDiscussion&gt;This policy setting determines whether the Kerberos Key Distribution Center (KDC) validates every request for a session ticke...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.

    &lt;VulnDiscussion&gt;This setting determines the maximum amount of time (in minutes) that a granted session ticket can be used to access a particu...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.

    &lt;VulnDiscussion&gt;In Kerberos, there are two types of tickets: Ticket Granting Tickets (TGTs) and Service Tickets. Kerberos tickets have a limi...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.

    &lt;VulnDiscussion&gt;This setting determines the period of time (in days) during which a user's Ticket Granting Ticket (TGT) may be renewed. This ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules