II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000341-GPOS-00132
Group -
Windows Server 2022 Security event log size must be configured to 196608 KB or greater.
Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and require frequent attention by administrative personnel.Rule Medium Severity -
SRG-OS-000341-GPOS-00132
Group -
Windows Server 2022 System event log size must be configured to 32768 KB or greater.
Inadequate log size will cause the log to fill up quickly. This may prevent audit events from being recorded properly and require frequent attention by administrative personnel.Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
Windows Server 2022 Microsoft Defender antivirus SmartScreen must be enabled.
Microsoft Defender antivirus SmartScreen helps protect systems from programs downloaded from the internet that may be malicious. Enabling SmartScreen can block potentially malicious programs or war...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
Group -
Windows Server 2022 Explorer Data Execution Prevention must be enabled.
Data Execution Prevention provides additional protection by performing checks on memory to help prevent malicious code from running. This setting will prevent Data Execution Prevention from being t...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2022 Turning off File Explorer heap termination on corruption must be disabled.
Legacy plug-in applications may continue to function when a File Explorer session has become corrupt. Disabling this feature will prevent this.Rule Low Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows Server 2022 File Explorer shell protocol must run in protected mode.
The shell protocol will limit the set of folders that applications can open when run in protected mode. Restricting files an application can open to a limited set of folders increases the security ...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
Windows Server 2022 must not save passwords in the Remote Desktop Client.
Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to another system. The system must be configured to prevent users from saving pa...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
Group -
Windows Server 2022 Remote Desktop Services must prevent drive redirection.
Preventing users from sharing the local drives on their client computers with Remote Session Hosts that they access helps reduce possible exposure of sensitive data.Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
Windows Server 2022 Remote Desktop Services must always prompt a client for passwords upon connection.
This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Disabling this setting would allow anyone to use the stored credentials in a...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
Group -
Windows Server 2022 Remote Desktop Services must require secure Remote Procedure Call (RPC) communications.
Allowing unsecure RPC communication exposes the system to man-in-the-middle attacks and data disclosure attacks. A man-in-the-middle attack occurs when an intruder captures packets between a client...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.