Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000362-GPOS-00149

    Group
  • Windows Server 2019 must prevent users from changing installation options.

    Installation options for applications are typically controlled by administrators. This setting prevents users from changing installation options that may bypass security features.
    Rule Medium Severity
  • SRG-OS-000362-GPOS-00149

    Group
  • Windows Server 2019 must disable the Windows Installer Always install with elevated privileges option.

    Standard user accounts must not be granted elevated privileges. Enabling Windows Installer to elevate privileges when installing applications can allow malicious persons and applications to gain fu...
    Rule High Severity
  • SRG-OS-000363-GPOS-00150

    Group
  • Windows Server 2019 system files must be monitored for unauthorized changes.

    Monitoring system files for changes against a baseline on a regular basis may help detect the possible introduction of malicious code on a system.
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    Group
  • Windows Server 2019 Autoplay must be turned off for non-volume devices.

    Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon as media is inserted into the drive. As a result, the setup file of programs or m...
    Rule High Severity
  • SRG-OS-000368-GPOS-00154

    Group
  • Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands.

    Allowing AutoRun commands to execute may introduce malicious code to a system. Configuring this setting prevents AutoRun commands from executing.
    Rule High Severity
  • SRG-OS-000368-GPOS-00154

    Group
  • Windows Server 2019 AutoPlay must be disabled for all drives.

    Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon media is inserted into the drive. As a result, the setup file of programs or musi...
    Rule High Severity
  • SRG-OS-000370-GPOS-00155

    Group
  • Windows Server 2019 must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.

    Using an allowlist provides a configuration management method to allow the execution of only authorized software. Using only authorized software decreases risk by limiting the number of potential v...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 must not save passwords in the Remote Desktop Client.

    Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to another system. The system must be configured to prevent users from saving pa...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 Remote Desktop Services must always prompt a client for passwords upon connection.

    This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Disabling this setting would allow anyone to use the stored credentials in a...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 Windows Remote Management (WinRM) service must not store RunAs credentials.

    Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Windows Remote Management will prevent them from being used with plug-ins. S...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 User Account Control approval mode for the built-in Administrator must be enabled.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures the built-in Administrator...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 User Account Control must automatically deny standard user requests for elevation.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting controls the behavior of elevation wh...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • Windows Server 2019 User Account Control must run all administrators in Admin Approval Mode, enabling UAC.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting enables UAC. Satisfies: SRG-OS-00037...
    Rule Medium Severity
  • SRG-OS-000379-GPOS-00164

    Group
  • Windows Server 2019 must restrict unauthenticated Remote Procedure Call (RPC) clients from connecting to the RPC server on domain-joined member servers and standalone or nondomain-joined systems.

    Unauthenticated RPC clients may allow anonymous access to sensitive information. Configuring RPC to restrict unauthenticated RPC clients from connecting to the RPC server will prevent anonymous con...
    Rule Medium Severity
  • SRG-OS-000379-GPOS-00164

    Group
  • Windows Server 2019 computer account password must not be prevented from being reset.

    Computer account passwords are changed automatically on a regular basis. Disabling automatic password changes can make the system more vulnerable to malicious access. Frequent password changes can ...
    Rule Medium Severity
  • SRG-OS-000393-GPOS-00173

    Group
  • Windows Server 2019 Windows Remote Management (WinRM) client must not allow unencrypted traffic.

    Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connections must be encrypted to prevent this. Satisfies: SRG-OS-000393-GPOS-0017...
    Rule Medium Severity
  • SRG-OS-000393-GPOS-00173

    Group
  • Windows Server 2019 Windows Remote Management (WinRM) service must not allow unencrypted traffic.

    Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connections must be encrypted to prevent this. Satisfies: SRG-OS-000393-GPOS-0017...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    Group
  • Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.

    Directory data that is not appropriately encrypted is subject to compromise. Commercial-grade encryption does not provide adequate protection when the classification level of directory data in tran...
    Rule Medium Severity
  • SRG-OS-000420-GPOS-00186

    Group
  • Windows Server 2019 must be configured to ignore NetBIOS name release requests except from WINS servers.

    Configuring the system to ignore name release requests, except from WINS servers, prevents a denial of service (DoS) attack. The DoS consists of sending a NetBIOS name release request to the server...
    Rule Low Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 domain controllers must require LDAP access signing.

    Unsigned network traffic is susceptible to man-in-the-middle attacks, where an intruder captures packets between the server and the client and modifies them before forwarding them to the client. In...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.

    Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not all information is encrypted. If this policy is enabled, outgoing secure c...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.

    Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not all information is encrypted. If this policy is enabled, outgoing secure c...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.

    Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the channel is not integrity checked. If this policy is enabled, outgoing secu...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 must be configured to require a strong session key.

    A computer connecting to a domain controller will establish a secure channel. The secure channel connection may be subject to compromise, such as hijacking or eavesdropping, if strong session keys ...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.

    The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules