Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • The password for the krbtgt account on a domain must be reset at least every 180 days.

    The krbtgt account acts as a service account for the Kerberos Key Distribution Center (KDC) service. The account and password are created when a domain is created and the password is typically not...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must limit the caching of logon credentials to four or less on domain-joined member servers.

    The default Windows configuration caches the last logon credentials for users who log on interactively to a system. This feature is provided for system availability reasons, such as the user's mach...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must be running Credential Guard on domain-joined member servers.

    Credential Guard uses virtualization-based security to protect data that could be used in credential theft attacks if compromised. This authentication information, which was stored in the Local Sec...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must prevent local accounts with blank passwords from being used from the network.

    An account without a password can allow unauthorized access to a system as only the username would be required. Password policies should prevent accounts with blank passwords from existing on a sys...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 built-in administrator account must be renamed.

    The built-in administrator account is a well-known account subject to attack. Renaming this account to an unidentified name improves the protection of this account and the system.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 built-in guest account must be renamed.

    The built-in guest account is a well-known user account on all Windows systems and, as initially installed, does not require a password. This can allow access to system resources by unauthorized us...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 maximum age for machine account passwords must be configured to 30 days or less.

    Computer account passwords are changed automatically on a regular basis. This setting controls the maximum password age that a machine account may have. This must be set to no more than 30 days, en...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 Smart Card removal option must be configured to Force Logoff or Lock Workstation.

    Unattended systems are susceptible to unauthorized use and must be locked. Configuring a system to lock when a smart card is removed will ensure the system is inaccessible when unattended.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must not allow anonymous SID/Name translation.

    Allowing anonymous SID/Name translation can provide sensitive information for accessing a system. Only authorized users must be able to perform such translations.
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.

    Anonymous enumeration of SAM accounts allows anonymous logon users (null session connections) to list all accounts names, thus providing a list of potential points to attack the system.
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must be configured to prevent anonymous users from having the same permissions as the Everyone group.

    Access by anonymous users must be restricted. If this setting is enabled, anonymous users have the same rights and permissions as the built-in Everyone group. Anonymous users must not have these pe...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.

    Services using Local System that use Negotiate when reverting to NTLM authentication may gain unauthorized access if allowed to authenticate anonymously versus using the computer identity.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must prevent NTLM from falling back to a Null session.

    NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must prevent PKU2U authentication using online identities.

    PKU2U is a peer-to-peer authentication protocol. This setting prevents online identities from authenticating to domain-joined systems. Authentication will be centrally managed with Windows user acc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM.

    The Kerberos v5 authentication protocol is the default for authentication of users who are logging on to domain accounts. NTLM, which is less secure, is retained in later Windows versions for compa...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must be configured to at least negotiate signing for LDAP client signing.

    This setting controls the signing requirements for LDAP clients. This must be set to "Negotiate signing" or "Require signing", depending on the environment and type of LDAP server in use.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.

    Microsoft has implemented a variety of security support providers for use with Remote Procedure Call (RPC) sessions. All of the options must be enabled to ensure the maximum security level.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.

    Microsoft has implemented a variety of security support providers for use with Remote Procedure Call (RPC) sessions. All of the options must be enabled to ensure the maximum security level.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 default permissions of global system objects must be strengthened.

    Windows systems maintain a global list of shared system resources such as DOS device names, mutexes, and semaphores. Each type of object is created with a default Discretionary Access Control List ...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must preserve zone information when saving attachments.

    Attachments from outside sources may contain malicious code. Preserving zone of origin (Internet, intranet, local, restricted) information on file attachments allows Windows to determine risk.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • Windows Server 2019 must disable automatically signing in the last interactive user after a system-initiated restart.

    Windows can be configured to automatically sign the user back in after a Windows Update restart. Some protections are in place to help ensure this is done in a secure fashion; however, disabling th...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Windows Server 2019 must have a host-based firewall installed and enabled.

    A firewall provides a line of defense against attack, allowing or blocking inbound and outbound connections based on a set of rules.
    Rule Medium Severity
  • SRG-OS-000041-GPOS-00019

    Group
  • Windows Server 2019 must have PowerShell Transcription enabled.

    Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 must be configured for certificate-based authentication for domain controllers.

    Active Directory domain services elevation of privilege vulnerability could allow a user rights to the system, such as administrative and other high-level capabilities.
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Windows Server 2019 must be configured for named-based strong mappings for certificates.

    Weak mappings give rise to security vulnerabilities and demand hardening measures. Certificate names must be correctly mapped to the intended user account in Active Directory. A lack of strong name...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules