Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000134-GPOS-00068

    Group
  • Windows Server 2019 administrator accounts must not be enumerated during elevation.

    Enumeration of administrator accounts when elevating can provide part of the logon information to an unauthorized user. This setting configures the system to always require users to type in a usern...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • Windows Server 2019 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.

    A compromised local administrator account can provide means for an attacker to move laterally between domain systems. With User Account Control enabled, filtering the privileged token for local ad...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • Windows Server 2019 UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting prevents User Interface Accessibility...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • Windows Server 2019 User Account Control must, at a minimum, prompt administrators for consent on the secure desktop.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures the elevation requirements...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • Windows Server 2019 User Account Control must be configured to detect application installations and prompt for elevation.

    User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting requires Windows to respond to applic...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • Windows Server 2019 User Account Control (UAC) must only elevate UIAccess applications that are installed in secure locations.

    UAC is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures Windows to only allow applications installed in a...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • Windows Server 2019 User Account Control (UAC) must virtualize file and registry write failures to per-user locations.

    UAC is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures non-UAC-compliant applications to run in virtuali...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • Windows Server 2019 non-system-created file shares must limit access to groups that require it.

    Shares on a system provide network access. To prevent exposing sensitive information, where shares are necessary, permissions must be reconfigured to give the minimum access to accounts that requir...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • Windows Server 2019 Remote Desktop Services must prevent drive redirection.

    Preventing users from sharing the local drives on their client computers with Remote Session Hosts that they access helps reduce possible exposure of sensitive data.
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • Windows Server 2019 data files owned by users must be on a different logical partition from the directory server data files.

    When directory service data files, especially for directories used for identification, authentication, or authorization, reside on the same logical partition as user-owned files, the directory serv...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules