II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000002-GPOS-00002
Group -
Windows Server 2019 must automatically remove or disable temporary user accounts after 72 hours.
If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To mitigate this risk, automated termination of al...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
Group -
Windows Server 2019 must be configured to audit Account Management - Security Group Management successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
Group -
Windows Server 2019 must be configured to audit Account Management - User Account Management successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
Group -
Windows Server 2019 must be configured to audit Account Management - User Account Management failures.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
Group -
Windows Server 2019 must be configured to audit Account Management - Computer Account Management successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
Windows Server 2019 must have the number of allowed bad logon attempts configured to three or less.
The account lockout feature, when enabled, prevents brute-force password attacks on the system. The higher this value is, the less effective the account lockout feature will be in protecting the lo...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
Windows Server 2019 must have the period of time before the bad logon counter is reset configured to 15 minutes or greater.
The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the period of time that must pass after failed logon attempts before the cou...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
Group -
Windows Server 2019 required legal notice must be configured to display before console logon.
Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access to system resources. Satisfies: SRG-OS-000023-GPOS-00006, SRG-OS-00002...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
Group -
Windows Server 2019 title for legal banner dialog box must be configured with the appropriate text.
Failure to display the logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access to system resources. Satisfies: SRG-OS-000023-GPOS-00006, SRG-OS-00022...Rule Low Severity -
SRG-OS-000028-GPOS-00009
Group -
Windows Server 2019 machine inactivity limit must be set to 15 minutes or less, locking the system with the screen saver.
Unattended systems are susceptible to unauthorized use and should be locked when unattended. The screen saver should be set at a maximum of 15 minutes and be password protected. This protects criti...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.