II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2022 File Explorer shell protocol must run in protected mode.
The shell protocol will limit the set of folders that applications can open when run in protected mode. Restricting files an application can open to a limited set of folders increases the security ...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
Windows Server 2022 must not save passwords in the Remote Desktop Client.
Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to another system. The system must be configured to prevent users from saving pa...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
Group -
Windows Server 2022 Remote Desktop Services must prevent drive redirection.
Preventing users from sharing the local drives on their client computers with Remote Session Hosts that they access helps reduce possible exposure of sensitive data.Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
Windows Server 2022 Remote Desktop Services must always prompt a client for passwords upon connection.
This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Disabling this setting would allow anyone to use the stored credentials in a...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
Group -
Windows Server 2022 Remote Desktop Services must require secure Remote Procedure Call (RPC) communications.
Allowing unsecure RPC communication exposes the system to man-in-the-middle attacks and data disclosure attacks. A man-in-the-middle attack occurs when an intruder captures packets between a client...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
Group -
Windows Server 2022 Remote Desktop Services must be configured with the client connection encryption set to High Level.
Remote connections must be encrypted to prevent interception of data or sensitive information. Selecting "High Level" will ensure encryption of Remote Desktop Services sessions in both directions. ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2022 must prevent attachments from being downloaded from RSS feeds.
Attachments from RSS feeds may not be secure. This setting will prevent attachments from being downloaded from RSS feeds.Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
Windows Server 2022 must disable Basic authentication for RSS feeds over HTTP.
Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
Windows Server 2022 must prevent Indexing of encrypted files.
Indexing of encrypted files may expose sensitive data. This setting prevents encrypted files from being indexed.Rule Medium Severity -
SRG-OS-000362-GPOS-00149
Group -
Windows Server 2022 must prevent users from changing installation options.
Installation options for applications are typically controlled by administrators. This setting prevents users from changing installation options that may bypass security features.Rule Medium Severity -
SRG-OS-000362-GPOS-00149
Group -
Windows Server 2022 must disable the Windows Installer Always install with elevated privileges option.
Standard user accounts must not be granted elevated privileges. Enabling Windows Installer to elevate privileges when installing applications can allow malicious persons and applications to gain fu...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2022 users must be notified if a web-based program attempts to install software.
Web-based programs may attempt to install malicious software on a system. Ensuring users are notified if a web-based program attempts to install software allows them to refuse the installation.Rule Medium Severity -
SRG-OS-000480-GPOS-00229
Group -
Windows Server 2022 must disable automatically signing in the last interactive user after a system-initiated restart.
Windows can be configured to automatically sign the user back in after a Windows Update restart. Some protections are in place to help ensure this is done in a secure fashion; however, disabling th...Rule Medium Severity -
SRG-OS-000042-GPOS-00020
Group -
Windows Server 2022 PowerShell script block logging must be enabled.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
Group -
Windows Server 2022 Windows Remote Management (WinRM) client must not use Basic authentication.
Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.Rule High Severity -
SRG-OS-000393-GPOS-00173
Group -
Windows Server 2022 Windows Remote Management (WinRM) client must not allow unencrypted traffic.
Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connections must be encrypted to prevent this. Satisfies: SRG-OS-000393-GPOS-0017...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
Group -
Windows Server 2022 Windows Remote Management (WinRM) client must not use Digest authentication.
Digest authentication is not as strong as other options and may be subject to man-in-the-middle attacks. Disallowing Digest authentication will reduce this potential.Rule Medium Severity -
SRG-OS-000125-GPOS-00065
Group -
Windows Server 2022 Windows Remote Management (WinRM) service must not use Basic authentication.
Basic authentication uses plain-text passwords that could be used to compromise a system. Disabling Basic authentication will reduce this potential.Rule High Severity -
SRG-OS-000393-GPOS-00173
Group -
Windows Server 2022 Windows Remote Management (WinRM) service must not allow unencrypted traffic.
Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connections must be encrypted to prevent this. Satisfies: SRG-OS-000393-GPOS-0017...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
Windows Server 2022 Windows Remote Management (WinRM) service must not store RunAs credentials.
Storage of administrative credentials could allow unauthorized access. Disallowing the storage of RunAs credentials for Windows Remote Management will prevent them from being used with plug-ins. S...Rule Medium Severity -
SRG-OS-000041-GPOS-00019
Group -
Windows Server 2022 must have PowerShell Transcription enabled.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
Windows Server 2022 must only allow administrators responsible for the domain controller to have Administrator rights on the system.
An account that does not have Administrator duties must not have Administrator rights. Such rights would allow the account to bypass or modify required security restrictions on that machine and mak...Rule High Severity -
SRG-OS-000112-GPOS-00057
Group -
Windows Server 2022 Kerberos user logon restrictions must be enforced.
This policy setting determines whether the Kerberos Key Distribution Center (KDC) validates every request for a session ticket against the user rights policy of the target computer. The policy is e...Rule Medium Severity -
SRG-OS-000112-GPOS-00057
Group -
Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.
This setting determines the maximum amount of time (in minutes) that a granted session ticket can be used to access a particular service. Session tickets are used only to authenticate new connectio...Rule Medium Severity -
SRG-OS-000112-GPOS-00057
Group -
Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.
In Kerberos, there are two types of tickets: Ticket Granting Tickets (TGTs) and Service Tickets. Kerberos tickets have a limited lifetime so the time an attacker has to implement an attack is limit...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.