Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000341-GPOS-00132

    Group
  • Windows Server 2019 Application event log size must be configured to 32768 KB or greater.

    Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and require frequent attention by administrative personnel.
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    Group
  • Windows Server 2019 Security event log size must be configured to 196608 KB or greater.

    Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and require frequent attention by administrative personnel.
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    Group
  • Windows Server 2019 System event log size must be configured to 32768 KB or greater.

    Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and require frequent attention by administrative personnel.
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    Group
  • Windows Server 2019 audit records must be backed up to a different system or media than the system being audited.

    Protection of log data includes assuring the log data is not accidentally lost or deleted. Audit information stored in one location is vulnerable to accidental or incidental deletion or alteration.
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    Group
  • The Windows Server 2019 time service must synchronize with an appropriate DOD time source.

    The Windows Time Service controls time synchronization settings. Time synchronization is essential for authentication and auditing purposes. If the Windows Time Service is used, it must synchronize...
    Rule Low Severity
  • SRG-OS-000362-GPOS-00149

    Group
  • Windows Server 2019 must prevent users from changing installation options.

    Installation options for applications are typically controlled by administrators. This setting prevents users from changing installation options that may bypass security features.
    Rule Medium Severity
  • SRG-OS-000362-GPOS-00149

    Group
  • Windows Server 2019 must disable the Windows Installer Always install with elevated privileges option.

    Standard user accounts must not be granted elevated privileges. Enabling Windows Installer to elevate privileges when installing applications can allow malicious persons and applications to gain fu...
    Rule High Severity
  • SRG-OS-000363-GPOS-00150

    Group
  • Windows Server 2019 system files must be monitored for unauthorized changes.

    Monitoring system files for changes against a baseline on a regular basis may help detect the possible introduction of malicious code on a system.
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    Group
  • Windows Server 2019 Autoplay must be turned off for non-volume devices.

    Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon as media is inserted into the drive. As a result, the setup file of programs or m...
    Rule High Severity
  • SRG-OS-000368-GPOS-00154

    Group
  • Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands.

    Allowing AutoRun commands to execute may introduce malicious code to a system. Configuring this setting prevents AutoRun commands from executing.
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules