Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000393-GPOS-00173

    Group
  • Windows Server 2019 Windows Remote Management (WinRM) client must not allow unencrypted traffic.

    Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connections must be encrypted to prevent this. Satisfies: SRG-OS-000393-GPOS-0017...
    Rule Medium Severity
  • SRG-OS-000393-GPOS-00173

    Group
  • Windows Server 2019 Windows Remote Management (WinRM) service must not allow unencrypted traffic.

    Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connections must be encrypted to prevent this. Satisfies: SRG-OS-000393-GPOS-0017...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    Group
  • Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.

    Directory data that is not appropriately encrypted is subject to compromise. Commercial-grade encryption does not provide adequate protection when the classification level of directory data in tran...
    Rule Medium Severity
  • SRG-OS-000420-GPOS-00186

    Group
  • Windows Server 2019 must be configured to ignore NetBIOS name release requests except from WINS servers.

    Configuring the system to ignore name release requests, except from WINS servers, prevents a denial of service (DoS) attack. The DoS consists of sending a NetBIOS name release request to the server...
    Rule Low Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 domain controllers must require LDAP access signing.

    Unsigned network traffic is susceptible to man-in-the-middle attacks, where an intruder captures packets between the server and the client and modifies them before forwarding them to the client. In...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.

    Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not all information is encrypted. If this policy is enabled, outgoing secure c...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.

    Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not all information is encrypted. If this policy is enabled, outgoing secure c...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.

    Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the channel is not integrity checked. If this policy is enabled, outgoing secu...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 must be configured to require a strong session key.

    A computer connecting to a domain controller will establish a secure channel. The secure channel connection may be subject to compromise, such as hijacking or eavesdropping, if strong session keys ...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • Windows Server 2019 setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.

    The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules