Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000324-GPOS-00125

    Group
  • The Profile single process user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with the "Profile single process" user right can monitor non-system processes ...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Restore files and directories user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with the "Restore files and directories" user right can circumvent file and di...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Take ownership of files or other objects user right must only be assigned to the Administrators group.

    Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with the "Take ownership of files or other objects" user right can take owners...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Hardened UNC paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.

    Additional security requirements are applied to Universal Naming Convention (UNC) paths specified in Hardened UNC paths before allowing access to them. This aids in preventing tampering with or spo...
    Rule Medium Severity
  • SRG-OS-000041-GPOS-00019

    Group
  • PowerShell Transcription must be enabled on Windows 10.

    Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Virtualization-based protection of code integrity must be enabled.

    Virtualization-based protection of code integrity enforces kernel mode memory protections and protects Code Integrity validation paths. This isolates the processes from the rest of the operating sy...
    Rule Low Severity
  • SRG-OS-000185-GPOS-00079

    Group
  • Internet Explorer must be disabled for Windows 10.

    Internet Explorer 11 (IE11) is no longer supported on Windows 10 semi-annual channel.
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    Group
  • Windows 10 must have command line process auditing events enabled for failures.

    When this policy setting is enabled, the operating system generates audit events when a process fails to start and the name of the program or user that created it. These audit events can assist in...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows 10 must not have portproxy enabled or in use.

    Having portproxy enabled or configured in Windows 10 could allow a man-in-the-middle attack.
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    Group
  • Copilot in Windows must be disabled for Windows 10.

    Some features may communicate with the vendor, sending system information or downloading data or components for the feature. Turning off this capability will prevent potentially sensitive informati...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows 10 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.

    Without Windows 10 systems being managed, devices could be rogue and become targets of an attacker.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules