1.1.1 (L1) Ensure 'Enforce password history' is set to '24 or more password(s)' | IDENTIFICATION AND AUTHENTICATION |
1.1.2 (L1) Ensure 'Maximum password age' is set to '365 or fewer days, but not 0' | IDENTIFICATION AND AUTHENTICATION |
1.1.3 (L1) Ensure 'Minimum password age' is set to '1 or more day(s)' | IDENTIFICATION AND AUTHENTICATION |
1.1.4 (L1) Ensure 'Minimum password length' is set to '14 or more character(s)' | IDENTIFICATION AND AUTHENTICATION |
1.1.5 (L1) Ensure 'Password must meet complexity requirements' is set to 'Enabled' | IDENTIFICATION AND AUTHENTICATION |
1.1.6 (L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled' | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.2.1 (L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One' | AUDIT AND ACCOUNTABILITY |
2.2.3 (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only) | SYSTEM AND INFORMATION INTEGRITY |
2.2.4 (L1) Ensure 'Act as part of the operating system' is set to 'No One' | ACCESS CONTROL |
2.2.6 (L1) Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE' | ACCESS CONTROL |
2.2.7 (L1) Ensure 'Allow log on locally' is set to 'Administrators' | ACCESS CONTROL |
2.2.9 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only) | ACCESS CONTROL |
2.2.10 (L1) Ensure 'Back up files and directories' is set to 'Administrators, Backup Operators' | ACCESS CONTROL |
2.2.11 (L1) Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE' | ACCESS CONTROL |
2.2.12 (L1) Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE' | ACCESS CONTROL |
2.2.13 (L1) Ensure 'Create a pagefile' is set to 'Administrators' | ACCESS CONTROL |
2.2.14 (L1) Ensure 'Create a token object' is set to 'No One' | ACCESS CONTROL |
2.2.15 (L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' | ACCESS CONTROL |
2.2.16 (L1) Ensure 'Create permanent shared objects' is set to 'No One' | ACCESS CONTROL |
2.2.18 (L1) Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines' (MS only) | ACCESS CONTROL |
2.2.19 (L1) Ensure 'Debug programs' is set to 'Administrators' | SYSTEM AND INFORMATION INTEGRITY |
2.2.20 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests' | ACCESS CONTROL |
2.2.21 (L1) Ensure 'Deny log on as a batch job' to include 'Guests' | ACCESS CONTROL |
2.2.22 (L1) Ensure 'Deny log on as a service' to include 'Guests' | ACCESS CONTROL |
2.2.23 (L1) Ensure 'Deny log on locally' to include 'Guests' | ACCESS CONTROL |
2.2.24 (L1) Ensure 'Deny log on through Remote Desktop Services' to include 'Guests' | ACCESS CONTROL |
2.2.26 (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only) | ACCESS CONTROL |
2.2.27 (L1) Ensure 'Force shutdown from a remote system' is set to 'Administrators' | ACCESS CONTROL |
2.2.28 (L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE' | AUDIT AND ACCOUNTABILITY |
2.2.30 (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' and (when the Web Server (IIS) Role with Web Services Role Service is installed) 'IIS_IUSRS' (MS only) | ACCESS CONTROL |
2.2.31 (L1) Ensure 'Increase scheduling priority' is set to 'Administrators' | ACCESS CONTROL |
2.2.32 (L1) Ensure 'Load and unload device drivers' is set to 'Administrators' | ACCESS CONTROL |
2.2.33 (L1) Ensure 'Lock pages in memory' is set to 'No One' | ACCESS CONTROL |
2.2.35 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only) | ACCESS CONTROL |
2.2.36 (L1) Ensure 'Modify an object label' is set to 'No One' | ACCESS CONTROL |
2.2.37 (L1) Ensure 'Modify firmware environment values' is set to 'Administrators' | ACCESS CONTROL |
2.2.38 (L1) Ensure 'Perform volume maintenance tasks' is set to 'Administrators' | ACCESS CONTROL |
2.2.39 (L1) Ensure 'Profile single process' is set to 'Administrators' | ACCESS CONTROL |
2.2.40 (L1) Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost' | ACCESS CONTROL |
2.2.41 (L1) Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE' | ACCESS CONTROL |
2.2.42 (L1) Ensure 'Restore files and directories' is set to 'Administrators, Backup Operators' | ACCESS CONTROL |
2.2.43 (L1) Ensure 'Shut down the system' is set to 'Administrators, Backup Operators' | ACCESS CONTROL |
2.2.45 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators' | ACCESS CONTROL |
2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts' | IDENTIFICATION AND AUTHENTICATION |
2.3.1.2 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only) | IDENTIFICATION AND AUTHENTICATION |
2.3.1.3 (L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled' | IDENTIFICATION AND AUTHENTICATION |
2.3.1.4 (L1) Configure 'Accounts: Rename administrator account' | IDENTIFICATION AND AUTHENTICATION |
2.3.1.5 (L1) Configure 'Accounts: Rename guest account' | IDENTIFICATION AND AUTHENTICATION |
2.3.2.1 (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled' | AUDIT AND ACCOUNTABILITY |
2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' | AUDIT AND ACCOUNTABILITY |