III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000112-GPOS-00057
Group -
Windows Server 2019 Kerberos user ticket lifetime must be limited to 10 hours or less.
In Kerberos, there are two types of tickets: Ticket Granting Tickets (TGTs) and Service Tickets. Kerberos tickets have a limited lifetime so the time an attacker has to implement an attack is limit...Rule Medium Severity -
SRG-OS-000112-GPOS-00057
Group -
Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.
This setting determines the period of time (in days) during which a user's TGT may be renewed. This security configuration limits the amount of time an attacker has to crack the TGT and gain access...Rule Medium Severity -
SRG-OS-000112-GPOS-00057
Group -
Windows Server 2019 computer clock synchronization tolerance must be limited to five minutes or less.
This setting determines the maximum time difference (in minutes) that Kerberos will tolerate between the time on a client's clock and the time on a server's clock while still considering the two cl...Rule Medium Severity -
SRG-OS-000118-GPOS-00060
Group -
Windows Server 2019 outdated or unused accounts must be removed or disabled.
Outdated or unused accounts provide penetration points that may go undetected. Inactive accounts must be deleted if no longer necessary or, if still required, disabled until needed.Rule Medium Severity -
SRG-OS-000120-GPOS-00061
Group -
Windows Server 2019 Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.
Certain encryption types are no longer considered secure. The DES and RC4 encryption suites must not be used for Kerberos encryption. Note: Organizations with domain controllers running earlier ve...Rule Medium Severity -
SRG-OS-000121-GPOS-00062
Group -
Windows Server 2019 must have the built-in guest account disabled.
A system faces an increased vulnerability threat if the built-in guest account is not disabled. This is a known account that exists on all Windows systems and cannot be deleted. This account is ini...Rule Medium Severity -
SRG-OS-000123-GPOS-00064
Group -
Windows Server 2019 must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.
Emergency administrator accounts are privileged accounts established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activatio...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
Group -
Windows Server 2019 Windows Remote Management (WinRM) client must not use Basic authentication.
Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.Rule High Severity -
SRG-OS-000125-GPOS-00065
Group -
Windows Server 2019 Windows Remote Management (WinRM) client must not use Digest authentication.
Digest authentication is not as strong as other options and may be subject to man-in-the-middle attacks. Disallowing Digest authentication will reduce this potential.Rule Medium Severity -
SRG-OS-000125-GPOS-00065
Group -
Windows Server 2019 Windows Remote Management (WinRM) service must not use Basic authentication.
Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.