1.1.1 (L1) Ensure 'Enforce password history' is set to '24 or more password(s)'
1.1.2 (L1) Ensure 'Maximum password age' is set to '365 or fewer days, but not 0'
1.1.3 (L1) Ensure 'Minimum password age' is set to '1 or more day(s)'
1.1.4 (L1) Ensure 'Minimum password length' is set to '14 or more character(s)'
1.1.5 (L1) Ensure 'Password must meet complexity requirements' is set to 'Enabled'
1.1.6 (L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled'
1.2.1 (L1) Ensure 'Account lockout duration' is set to '15 or more minute(s)'
1.2.2 (L1) Ensure 'Account lockout threshold' is set to '5 or fewer invalid logon attempt(s), but not 0'
1.2.3 (L1) Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'
17.1.1 (L1) Ensure 'Audit Credential Validation' is set to 'Success and Failure'
17.2.1 (L1) Ensure 'Audit Application Group Management' is set to 'Success and Failure'
17.2.5 (L1) Ensure 'Audit Security Group Management' is set to include 'Success'
17.2.6 (L1) Ensure 'Audit User Account Management' is set to 'Success and Failure'
17.3.1 (L1) Ensure 'Audit Process Creation' is set to include 'Success'
17.5.1 (L1) Ensure 'Audit Account Lockout' is set to include 'Failure'
17.5.2 (L1) Ensure 'Audit Logoff' is set to include 'Success'
17.5.3 (L1) Ensure 'Audit Logon' is set to 'Success and Failure'
17.5.4 (L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'
17.5.5 (L1) Ensure 'Audit Special Logon' is set to include 'Success'
17.6.1 (L1) Ensure 'Audit Detailed File Share' is set to include 'Failure'
17.6.2 (L1) Ensure 'Audit File Share' is set to 'Success and Failure'
17.6.3 (L1) Ensure 'Audit Other Object Access Events' is set to 'Success and Failure'
17.7.1 (L1) Ensure 'Audit Audit Policy Change' is set to include 'Success'
17.7.2 (L1) Ensure 'Audit Authentication Policy Change' is set to include 'Success'
17.7.3 (L1) Ensure 'Audit Authorization Policy Change' is set to include 'Success'
17.7.4 (L1) Ensure 'Audit MPSSVC Rule-Level Policy Change' is set to 'Success and Failure'
17.7.5 (L1) Ensure 'Audit Other Policy Change Events' is set to include 'Failure'
17.8.1 (L1) Ensure 'Audit Sensitive Privilege Use' is set to 'Success and Failure'
17.9.1 (L1) Ensure 'Audit IPsec Driver' is set to 'Success and Failure'
17.9.2 (L1) Ensure 'Audit Other System Events' is set to 'Success and Failure'
17.9.3 (L1) Ensure 'Audit Security State Change' is set to include 'Success'
17.9.4 (L1) Ensure 'Audit Security System Extension' is set to include 'Success'
17.9.5 (L1) Ensure 'Audit System Integrity' is set to 'Success and Failure'
18.2.1 (L1) Ensure LAPS AdmPwd GPO Extension / CSE is installed (MS only)
18.2.2 (L1) Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' (MS only)
18.2.3 (L1) Ensure 'Enable Local Admin Password Management' is set to 'Enabled' (MS only)
18.2.4 (L1) Ensure 'Password Settings: Password Complexity' is set to 'Enabled: Large letters + small letters + numbers + special characters' (MS only)
18.2.5 (L1) Ensure 'Password Settings: Password Length' is set to 'Enabled: 15 or more' (MS only)
18.2.6 (L1) Ensure 'Password Settings: Password Age (Days)' is set to 'Enabled: 30 or fewer' (MS only)
18.3.1 (L1) Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' (MS only)
18.3.2 (L1) Ensure 'Configure SMB v1 client' is set to 'Enabled: Bowser, MRxSmb20, NSI'
18.3.3 (L1) Ensure 'Configure SMB v1 client driver' is set to 'Enabled: Disable driver (recommended)'
18.3.4 (L1) Ensure 'Configure SMB v1 server' is set to 'Disabled'
18.3.5 (L1) Ensure 'Enable Structured Exception Handling Overwrite Protection (SEHOP)' is set to 'Enabled'
18.3.7 (L1) Ensure 'Limits print driver installation to Administrators' is set to 'Enabled'
18.3.8 (L1) Ensure 'NetBT NodeType configuration' is set to 'Enabled: P-node (recommended)'
18.3.9 (L1) Ensure 'WDigest Authentication' is set to 'Disabled'
18.4.1 (L1) Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled'
18.4.12 (L1) Ensure 'MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning' is set to 'Enabled: 90% or less'
18.4.2 (L1) Ensure 'MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled'
18.4.3 (L1) Ensure 'MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled'
18.4.4 (L1) Ensure 'MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes' is set to 'Disabled'
18.4.6 (L1) Ensure 'MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers' is set to 'Enabled'
18.4.8 (L1) Ensure 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)' is set to 'Enabled'
18.4.9 (L1) Ensure 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)' is set to 'Enabled: 5 or fewer seconds'
18.5.11.2 (L1) Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled'
18.5.11.3 (L1) Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled'
18.5.14.1 (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares'
18.5.4.1 (L1) Ensure 'Configure DNS over HTTPS (DoH) name resolution' is set to 'Enabled: Allow DoH' or higher
18.5.4.2 (L1) Ensure 'Turn off multicast name resolution' is set to 'Enabled'
18.6.2 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'
18.6.3 (L1) Ensure 'Point and Print Restrictions: When updating drivers for an existing connection' is set to 'Enabled: Show warning and elevation prompt'
18.8.21.2 (L1) Ensure 'Configure registry policy processing: Do not apply during periodic background processing' is set to 'Enabled: FALSE'
18.8.21.3 (L1) Ensure 'Configure registry policy processing: Process even if the Group Policy objects have not changed' is set to 'Enabled: TRUE'
18.8.21.4 (L1) Ensure 'Turn off background refresh of Group Policy' is set to 'Disabled'
18.8.22.1.1 (L1) Ensure 'Turn off downloading of print drivers over HTTP' is set to 'Enabled'
18.8.22.1.5 (L1) Ensure 'Turn off Internet download for Web publishing and online ordering wizards' is set to 'Enabled'
18.8.28.1 (L1) Ensure 'Always use classic logon' is set to 'Enabled'
18.8.34.6.1 (L1) Ensure 'Require a password when a computer wakes (on battery)' is set to 'Enabled'
18.8.34.6.2 (L1) Ensure 'Require a password when a computer wakes (plugged in)' is set to 'Enabled'
18.8.36.1 (L1) Ensure 'Configure Offer Remote Assistance' is set to 'Disabled'
18.8.36.2 (L1) Ensure 'Configure Solicited Remote Assistance' is set to 'Disabled'
18.8.37.1 (L1) Ensure 'Enable RPC Endpoint Mapper Client Authentication' is set to 'Enabled' (MS only)
18.8.4.1 (L1) Ensure 'Encryption Oracle Remediation' is set to 'Enabled: Force Updated Clients'
18.8.7.2 (L1) Ensure 'Allow remote access to the Plug and Play interface' is set to 'Disabled'
18.8.7.3 (L1) Ensure 'Prevent device metadata retrieval from the Internet' is set to 'Enabled'
18.9.100.1 (L1) Ensure 'Turn on PowerShell Script Block Logging' is set to 'Enabled'
18.9.100.2 (L1) Ensure 'Turn on PowerShell Transcription' is set to 'Disabled'
18.9.102.1.1 (L1) Ensure 'Allow Basic authentication' is set to 'Disabled'
18.9.102.1.2 (L1) Ensure 'Allow unencrypted traffic' is set to 'Disabled'
18.9.102.1.3 (L1) Ensure 'Disallow Digest authentication' is set to 'Enabled'
18.9.102.2.1 (L1) Ensure 'Allow Basic authentication' is set to 'Disabled'
18.9.102.2.3 (L1) Ensure 'Allow unencrypted traffic' is set to 'Disabled'
18.9.102.2.4 (L1) Ensure 'Disallow WinRM from storing RunAs credentials' is set to 'Enabled'
18.9.108.1.1 (L1) Ensure 'Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box' is set to 'Disabled'
18.9.108.1.2 (L1) Ensure 'Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box' is set to 'Disabled'
18.9.108.1.3 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'
18.9.108.1.4 (L1) Ensure 'Reschedule Automatic Updates scheduled installations' is set to 'Enabled: 1 minute'
18.9.108.2.1 (L1) Ensure 'Configure Automatic Updates' is set to 'Enabled'
18.9.108.2.2 (L1) Ensure 'Configure Automatic Updates: Scheduled install day' is set to '0 - Every day'
18.9.16.1 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'
18.9.19.1 (L1) Ensure 'Turn off desktop gadgets' is set to 'Enabled'
18.9.19.2 (L1) Ensure 'Turn Off user-installed desktop gadgets' is set to 'Enabled'
18.9.25.1 (L1) Ensure 'EMET 5.52' or higher is installed
18.9.25.2 (L1) Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings)
18.9.25.3 (L1) Ensure 'Default Protections for Internet Explorer' is set to 'Enabled'
18.9.25.4 (L1) Ensure 'Default Protections for Popular Software' is set to 'Enabled'
18.9.25.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled'
18.9.25.6 (L1) Ensure 'System ASLR' is set to 'Enabled: Application Opt-In'
18.9.25.7 (L1) Ensure 'System DEP' is set to 'Enabled: Application Opt-Out'
18.9.25.8 (L1) Ensure 'System SEHOP' is set to 'Enabled: Application Opt-Out'
18.9.27.1.1 (L1) Ensure 'Application: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
18.9.27.1.2 (L1) Ensure 'Application: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
18.9.27.2.1 (L1) Ensure 'Security: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
18.9.27.2.2 (L1) Ensure 'Security: Specify the maximum log file size (KB)' is set to 'Enabled: 196,608 or greater'
18.9.27.3.1 (L1) Ensure 'Setup: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
18.9.27.3.2 (L1) Ensure 'Setup: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
18.9.27.4.1 (L1) Ensure 'System: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
18.9.27.4.2 (L1) Ensure 'System: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
18.9.31.2 (L1) Ensure 'Turn off Data Execution Prevention for Explorer' is set to 'Disabled'
18.9.31.3 (L1) Ensure 'Turn off heap termination on corruption' is set to 'Disabled'
18.9.31.4 (L1) Ensure 'Turn off shell protocol protected mode' is set to 'Disabled'
18.9.47.15 (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'
18.9.58.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'
18.9.58.2 (L1) Ensure 'Prevent the usage of OneDrive for file storage on Windows 8.1' is set to 'Enabled'
18.9.65.2.2 (L1) Ensure 'Do not allow passwords to be saved' is set to 'Enabled'
18.9.65.3.11.1 (L1) Ensure 'Do not delete temp folders upon exit' is set to 'Disabled'
18.9.65.3.11.2 (L1) Ensure 'Do not use temporary folders per session' is set to 'Disabled'
18.9.65.3.3.2 (L1) Ensure 'Do not allow drive redirection' is set to 'Enabled'
18.9.65.3.9.1 (L1) Ensure 'Always prompt for password upon connection' is set to 'Enabled'
18.9.65.3.9.2 (L1) Ensure 'Require secure RPC communication' is set to 'Enabled'
18.9.65.3.9.3 (L1) Ensure 'Require use of specific security layer for remote (RDP) connections' is set to 'Enabled: SSL'
18.9.65.3.9.4 (L1) Ensure 'Require user authentication for remote connections by using Network Level Authentication' is set to 'Enabled'
18.9.65.3.9.5 (L1) Ensure 'Set client connection encryption level' is set to 'Enabled: High Level'
18.9.66.1 (L1) Ensure 'Prevent downloading of enclosures' is set to 'Enabled'
18.9.67.2 (L1) Ensure 'Allow indexing of encrypted files' is set to 'Disabled'
18.9.8.1 (L1) Ensure 'Disallow Autoplay for non-volume devices' is set to 'Enabled'
18.9.8.2 (L1) Ensure 'Set the default behavior for AutoRun' is set to 'Enabled: Do not execute any autorun commands'
18.9.8.3 (L1) Ensure 'Turn off Autoplay' is set to 'Enabled: All drives'
18.9.86.2.1 (L1) Ensure 'Configure Default consent' is set to 'Enabled: Always ask before sending data'
18.9.90.1 (L1) Ensure 'Allow user control over installs' is set to 'Disabled'
18.9.90.2 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'
19.1.3.1 (L1) Ensure 'Enable screen saver' is set to 'Enabled'
19.1.3.2 (L1) Ensure 'Force specific screen saver: Screen saver executable name' is set to 'Enabled: scrnsave.scr'
19.1.3.3 (L1) Ensure 'Password protect the screen saver' is set to 'Enabled'
19.1.3.4 (L1) Ensure 'Screen saver timeout' is set to 'Enabled: 900 seconds or fewer, but not 0'
19.7.28.1 (L1) Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled'
19.7.4.1 (L1) Ensure 'Do not preserve zone information in file attachments' is set to 'Disabled'
19.7.4.2 (L1) Ensure 'Notify antivirus programs when opening attachments' is set to 'Enabled'
19.7.43.1 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'
2.2.1 (L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'
2.2.10 (L1) Ensure 'Back up files and directories' is set to 'Administrators'
2.2.11 (L1) Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'
2.2.12 (L1) Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE'
2.2.13 (L1) Ensure 'Create a pagefile' is set to 'Administrators'
2.2.14 (L1) Ensure 'Create a token object' is set to 'No One'
2.2.15 (L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'
2.2.16 (L1) Ensure 'Create permanent shared objects' is set to 'No One'
2.2.18 (L1) Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines' (MS only)
2.2.19 (L1) Ensure 'Debug programs' is set to 'Administrators'
2.2.21 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests, Local account and member of Administrators group' (MS only)
2.2.22 (L1) Ensure 'Deny log on as a batch job' to include 'Guests'
2.2.23 (L1) Ensure 'Deny log on as a service' to include 'Guests'
2.2.24 (L1) Ensure 'Deny log on locally' to include 'Guests'
2.2.26 (L1) Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account' (MS only)
2.2.28 (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only)
2.2.29 (L1) Ensure 'Force shutdown from a remote system' is set to 'Administrators'
2.2.3 (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only)
2.2.30 (L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'
2.2.32 (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' and (when the Web Server (IIS) Role with Web Services Role Service is installed) 'IIS_IUSRS' (MS only)
2.2.33 (L1) Ensure 'Increase scheduling priority' is set to 'Administrators'
2.2.34 (L1) Ensure 'Load and unload device drivers' is set to 'Administrators'
2.2.35 (L1) Ensure 'Lock pages in memory' is set to 'No One'
2.2.38 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only)
2.2.39 (L1) Ensure 'Modify an object label' is set to 'No One'
2.2.4 (L1) Ensure 'Act as part of the operating system' is set to 'No One'
2.2.40 (L1) Ensure 'Modify firmware environment values' is set to 'Administrators'
2.2.41 (L1) Ensure 'Perform volume maintenance tasks' is set to 'Administrators'
2.2.42 (L1) Ensure 'Profile single process' is set to 'Administrators'
2.2.43 (L1) Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost'
2.2.44 (L1) Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'
2.2.45 (L1) Ensure 'Restore files and directories' is set to 'Administrators'
2.2.46 (L1) Ensure 'Shut down the system' is set to 'Administrators'
2.2.48 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators'
2.2.6 (L1) Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'
2.2.7 (L1) Ensure 'Allow log on locally' is set to 'Administrators'
2.2.9 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only)
2.3.1.1 (L1) Ensure 'Accounts: Administrator account status' is set to 'Disabled' (MS only)
2.3.1.2 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only)
2.3.1.3 (L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'
2.3.10.1 (L1) Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled'
2.3.10.10 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'
2.3.10.11 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)
2.3.10.12 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None'
2.3.10.13 (L1) Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves'
2.3.10.2 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (MS only)
2.3.10.3 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (MS only)
2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled'
2.3.10.7 (L1) Configure 'Network access: Named Pipes that can be accessed anonymously' (MS only)
2.3.10.9 (L1) Configure 'Network access: Remotely accessible registry paths and sub-paths' is configured
2.3.11.1 (L1) Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to 'Enabled'
2.3.11.10 (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'
2.3.11.3 (L1) Ensure 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' is set to 'Disabled'
2.3.11.4 (L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'
2.3.11.5 (L1) Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled'
2.3.11.6 (L1) Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'
2.3.11.7 (L1) Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM'
2.3.11.8 (L1) Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher
2.3.11.9 (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
2.3.13.1 (L1) Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled'
2.3.15.1 (L1) Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled'
2.3.15.2 (L1) Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled'
2.3.16.1 (L1) Ensure 'System settings: Optional subsystems' is set to 'Defined: (blank)'
2.3.17.1 (L1) Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled'
2.3.17.2 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop'
2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'
2.3.17.4 (L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled'
2.3.17.5 (L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled'
2.3.17.6 (L1) Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled'
2.3.17.7 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled'
2.3.17.8 (L1) Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to 'Enabled'
2.3.2.1 (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'
2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'
2.3.4.1 (L1) Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators'
2.3.4.2 (L1) Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled'
2.3.6.1 (L1) Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'
2.3.6.2 (L1) Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'
2.3.6.3 (L1) Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled'
2.3.6.4 (L1) Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled'
2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0'
2.3.6.6 (L1) Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled'
2.3.7.1 (L1) Ensure 'Interactive logon: Do not display last user name' is set to 'Enabled'
2.3.7.2 (L1) Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled'
2.3.7.3 (L1) Configure 'Interactive logon: Message text for users attempting to log on'
2.3.7.4 (L1) Configure 'Interactive logon: Message title for users attempting to log on'
2.3.7.6 (L1) Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days'
2.3.7.7 (L1) Ensure 'Interactive logon: Require Domain Controller Authentication to unlock workstation' is set to 'Enabled' (MS only)
2.3.7.8 (L1) Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher
2.3.8.1 (L1) Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled'
2.3.8.2 (L1) Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled'
2.3.8.3 (L1) Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled'
2.3.9.1 (L1) Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)'
2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'
2.3.9.3 (L1) Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'
2.3.9.4 (L1) Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'
2.3.9.5 (L1) Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or higher (MS only)
9.1.1 (L1) Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)'
9.1.2 (L1) Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)'
9.1.3 (L1) Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)'
9.1.4 (L1) Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No'
9.1.5 (L1) Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\domainfw.log'
9.1.6 (L1) Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater'
9.1.7 (L1) Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes'
9.1.8 (L1) Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes'
9.2.1 (L1) Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)'
9.2.2 (L1) Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)'
9.2.3 (L1) Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)'
9.2.4 (L1) Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No'
9.2.5 (L1) Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\privatefw.log'
9.2.6 (L1) Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater'
9.2.7 (L1) Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes'
9.2.8 (L1) Ensure 'Windows Firewall: Private: Logging: Log successful connections' is set to 'Yes'
9.3.1 (L1) Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)'
9.3.10 (L1) Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes'
9.3.2 (L1) Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)'
9.3.3 (L1) Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)'
9.3.4 (L1) Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'No'
9.3.5 (L1) Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No'
9.3.6 (L1) Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No'
9.3.7 (L1) Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\publicfw.log'
9.3.8 (L1) Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater'
9.3.9 (L1) Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes'
Removed
1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'
1.1.2 Ensure 'Maximum password age' is set to '365 or fewer days, but not 0'
1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)'
1.1.4 Ensure 'Minimum password length' is set to '14 or more character(s)'
1.1.5 Ensure 'Password must meet complexity requirements' is set to 'Enabled'
1.1.6 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'
1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'
1.2.2 Ensure 'Account lockout threshold' is set to '5 or fewer invalid logon attempt(s), but not 0'
1.2.3 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'
17.1.1 Ensure 'Audit Credential Validation' is set to 'Success and Failure'
17.2.1 Ensure 'Audit Application Group Management' is set to 'Success and Failure'
17.2.5 Ensure 'Audit Security Group Management' is set to include 'Success'
17.2.6 Ensure 'Audit User Account Management' is set to 'Success and Failure'
17.3.1 Ensure 'Audit Process Creation' is set to include 'Success'
17.5.1 Ensure 'Audit Account Lockout' is set to include 'Failure'
17.5.2 Ensure 'Audit Logoff' is set to include 'Success'
17.5.3 Ensure 'Audit Logon' is set to 'Success and Failure'
17.5.4 Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'
17.5.5 Ensure 'Audit Special Logon' is set to include 'Success'
17.6.1 Ensure 'Audit Detailed File Share' is set to include 'Failure'
17.6.2 Ensure 'Audit File Share' is set to 'Success and Failure'
17.6.3 Ensure 'Audit Other Object Access Events' is set to 'Success and Failure'
17.7.1 Ensure 'Audit Audit Policy Change' is set to include 'Success'
17.7.2 Ensure 'Audit Authentication Policy Change' is set to include 'Success'
17.7.3 Ensure 'Audit Authorization Policy Change' is set to include 'Success'
17.7.4 Ensure 'Audit MPSSVC Rule-Level Policy Change' is set to 'Success and Failure'
17.7.5 Ensure 'Audit Other Policy Change Events' is set to include 'Failure'
17.8.1 Ensure 'Audit Sensitive Privilege Use' is set to 'Success and Failure'
17.9.1 Ensure 'Audit IPsec Driver' is set to 'Success and Failure'
17.9.2 Ensure 'Audit Other System Events' is set to 'Success and Failure'
17.9.3 Ensure 'Audit Security State Change' is set to include 'Success'
17.9.4 Ensure 'Audit Security System Extension' is set to include 'Success'
17.9.5 Ensure 'Audit System Integrity' is set to 'Success and Failure'
18.2.1 Ensure LAPS AdmPwd GPO Extension / CSE is installed (MS only)
18.2.2 Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' (MS only)
18.2.3 Ensure 'Enable Local Admin Password Management' is set to 'Enabled' (MS only)
18.2.4 Ensure 'Password Settings: Password Complexity' is set to 'Enabled: Large letters + small letters + numbers + special characters' (MS only)
18.2.5 Ensure 'Password Settings: Password Length' is set to 'Enabled: 15 or more' (MS only)
18.2.6 Ensure 'Password Settings: Password Age (Days)' is set to 'Enabled: 30 or fewer' (MS only)
18.3.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' (MS only)
18.3.2 Ensure 'Configure SMB v1 client' is set to 'Enabled: Bowser, MRxSmb20, NSI'
18.3.3 Ensure 'Configure SMB v1 client driver' is set to 'Enabled: Disable driver (recommended)'
18.3.4 Ensure 'Configure SMB v1 server' is set to 'Disabled'
18.3.5 Ensure 'Enable Structured Exception Handling Overwrite Protection (SEHOP)' is set to 'Enabled'
18.3.7 Ensure 'Limits print driver installation to Administrators' is set to 'Enabled'
18.3.8 Ensure 'NetBT NodeType configuration' is set to 'Enabled: P-node (recommended)'
18.3.9 Ensure 'WDigest Authentication' is set to 'Disabled'
18.4.1 Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled'
18.4.12 Ensure 'MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning' is set to 'Enabled: 90% or less'
18.4.2 Ensure 'MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled'
18.4.3 Ensure 'MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled'
18.4.4 Ensure 'MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes' is set to 'Disabled'
18.4.6 Ensure 'MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers' is set to 'Enabled'
18.4.8 Ensure 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)' is set to 'Enabled'
18.4.9 Ensure 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)' is set to 'Enabled: 5 or fewer seconds'
18.5.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled'
18.5.11.3 Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled'
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGON/RequireIntegrity
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGON/RequireMutualAuthentication
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOL/RequireIntegrity
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOL/RequireMutualAuthentication
18.5.4.1 Ensure 'Configure DNS over HTTPS (DoH) name resolution' is set to 'Enabled: Allow DoH' or higher
18.5.4.2 Ensure 'Turn off multicast name resolution' is set to 'Enabled'
18.6.2 Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'
18.6.3 Ensure 'Point and Print Restrictions: When updating drivers for an existing connection' is set to 'Enabled: Show warning and elevation prompt'
18.8.21.2 Ensure 'Configure registry policy processing: Do not apply during periodic background processing' is set to 'Enabled: FALSE'
18.8.21.3 Ensure 'Configure registry policy processing: Process even if the Group Policy objects have not changed' is set to 'Enabled: TRUE'
18.8.21.4 Ensure 'Turn off background refresh of Group Policy' is set to 'Disabled'
18.8.22.1.1 Ensure 'Turn off downloading of print drivers over HTTP' is set to 'Enabled'
18.8.22.1.5 Ensure 'Turn off Internet download for Web publishing and online ordering wizards' is set to 'Enabled'
18.8.28.1 Ensure 'Always use classic logon' is set to 'Enabled'
18.8.34.6.1 Ensure 'Require a password when a computer wakes (on battery)' is set to 'Enabled'
18.8.34.6.2 Ensure 'Require a password when a computer wakes (plugged in)' is set to 'Enabled'
18.8.36.1 Ensure 'Configure Offer Remote Assistance' is set to 'Disabled'
18.8.36.2 Ensure 'Configure Solicited Remote Assistance' is set to 'Disabled'
18.8.37.1 Ensure 'Enable RPC Endpoint Mapper Client Authentication' is set to 'Enabled' (MS only)
18.8.4.1 Ensure 'Encryption Oracle Remediation' is set to 'Enabled: Force Updated Clients'
18.8.7.2 Ensure 'Allow remote access to the Plug and Play interface' is set to 'Disabled'
18.8.7.3 Ensure 'Prevent device metadata retrieval from the Internet' is set to 'Enabled'
18.9.100.1 Ensure 'Turn on PowerShell Script Block Logging' is set to 'Enabled'
18.9.100.2 Ensure 'Turn on PowerShell Transcription' is set to 'Disabled'
18.9.102.1.1 Ensure 'Allow Basic authentication' is set to 'Disabled'
18.9.102.1.2 Ensure 'Allow unencrypted traffic' is set to 'Disabled'
18.9.102.1.3 Ensure 'Disallow Digest authentication' is set to 'Enabled'
18.9.102.2.1 Ensure 'Allow Basic authentication' is set to 'Disabled'
18.9.102.2.3 Ensure 'Allow unencrypted traffic' is set to 'Disabled'
18.9.102.2.4 Ensure 'Disallow WinRM from storing RunAs credentials' is set to 'Enabled'
18.9.108.1.1 Ensure 'Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box' is set to 'Disabled'
18.9.108.1.2 Ensure 'Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box' is set to 'Disabled'
18.9.108.1.3 Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'
18.9.108.1.4 Ensure 'Reschedule Automatic Updates scheduled installations' is set to 'Enabled: 1 minute'
18.9.108.2.1 Ensure 'Configure Automatic Updates' is set to 'Enabled'
18.9.108.2.2 Ensure 'Configure Automatic Updates: Scheduled install day' is set to '0 - Every day'
18.9.16.1 Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'
18.9.19.1 Ensure 'Turn off desktop gadgets' is set to 'Enabled'
18.9.19.2 Ensure 'Turn Off user-installed desktop gadgets' is set to 'Enabled'
18.9.25.1 Ensure 'EMET 5.52' or higher is installed
18.9.25.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings)
18.9.25.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - Anti Detours
18.9.25.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - Banned Functions
18.9.25.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - Deep Hooks
18.9.25.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - Exploit Action
18.9.25.3 Ensure 'Default Protections for Internet Explorer' is set to 'Enabled'
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - 7z.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - 7zG.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - FirefoxPluginContainer
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Foxit Reader.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - LYNC.EXE
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - OIS.EXE
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Photoshop.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - QuickTimePlayer.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Safari.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - SkyDrive.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Skype.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - ThunderbirdPluginContainer
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - WLXPhotoGallery.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - WindowsLiveWriter.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - chrome.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - communicator.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - firefox.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - googletalk.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - iTunes.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - mirc.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - opera.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - pidgin.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - rar.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - realconverter.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - realplay.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - thunderbird.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - unrar.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - vlc.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winamp.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winrar.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winzip32.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winzip64.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - wlmail.exe
18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - wmplayer.exe
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - AcroRd32.exe
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - Acrobat.exe
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - EXCEL.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - INFOPATH.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - LYNC.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - MSACCESS.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - MSPUB.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - OIS.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - OUTLOOK.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - POWERPNT.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - PPTVIEW.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - VISIO.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - VPREVIEW.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - WINWORD.EXE
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - java.exe
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - javaw.exe
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - javaws.exe
18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - wordpad.exe
18.9.25.6 Ensure 'System ASLR' is set to 'Enabled: Application Opt-In'
18.9.25.7 Ensure 'System DEP' is set to 'Enabled: Application Opt-Out'
18.9.25.8 Ensure 'System SEHOP' is set to 'Enabled: Application Opt-Out'
18.9.27.1.1 Ensure 'Application: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
18.9.27.1.2 Ensure 'Application: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
18.9.27.2.1 Ensure 'Security: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
18.9.27.2.2 Ensure 'Security: Specify the maximum log file size (KB)' is set to 'Enabled: 196,608 or greater'
18.9.27.3.1 Ensure 'Setup: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
18.9.27.3.2 Ensure 'Setup: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
18.9.27.4.1 Ensure 'System: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
18.9.27.4.2 Ensure 'System: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
18.9.31.2 Ensure 'Turn off Data Execution Prevention for Explorer' is set to 'Disabled'
18.9.31.3 Ensure 'Turn off heap termination on corruption' is set to 'Disabled'
18.9.31.4 Ensure 'Turn off shell protocol protected mode' is set to 'Disabled'
18.9.47.15 Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'
18.9.58.1 Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'
18.9.58.2 Ensure 'Prevent the usage of OneDrive for file storage on Windows 8.1' is set to 'Enabled'
18.9.65.2.2 Ensure 'Do not allow passwords to be saved' is set to 'Enabled'
18.9.65.3.11.1 Ensure 'Do not delete temp folders upon exit' is set to 'Disabled'
18.9.65.3.11.2 Ensure 'Do not use temporary folders per session' is set to 'Disabled'
18.9.65.3.3.2 Ensure 'Do not allow drive redirection' is set to 'Enabled'
18.9.65.3.9.1 Ensure 'Always prompt for password upon connection' is set to 'Enabled'
18.9.65.3.9.2 Ensure 'Require secure RPC communication' is set to 'Enabled'
18.9.65.3.9.3 Ensure 'Require use of specific security layer for remote (RDP) connections' is set to 'Enabled: SSL'
18.9.65.3.9.4 Ensure 'Require user authentication for remote connections by using Network Level Authentication' is set to 'Enabled'
18.9.65.3.9.5 Ensure 'Set client connection encryption level' is set to 'Enabled: High Level'
18.9.66.1 Ensure 'Prevent downloading of enclosures' is set to 'Enabled'
18.9.67.2 Ensure 'Allow indexing of encrypted files' is set to 'Disabled'
18.9.8.1 Ensure 'Disallow Autoplay for non-volume devices' is set to 'Enabled'
18.9.8.2 Ensure 'Set the default behavior for AutoRun' is set to 'Enabled: Do not execute any autorun commands'
18.9.8.3 Ensure 'Turn off Autoplay' is set to 'Enabled: All drives'
18.9.86.2.1 Ensure 'Configure Default consent' is set to 'Enabled: Always ask before sending data'
18.9.90.1 Ensure 'Allow user control over installs' is set to 'Disabled'
18.9.90.2 Ensure 'Always install with elevated privileges' is set to 'Disabled'
19.1.3.1 Ensure 'Enable screen saver' is set to 'Enabled'
19.1.3.2 Ensure 'Force specific screen saver: Screen saver executable name' is set to 'Enabled: scrnsave.scr'
19.1.3.3 Ensure 'Password protect the screen saver' is set to 'Enabled'
19.1.3.4 Ensure 'Screen saver timeout' is set to 'Enabled: 900 seconds or fewer, but not 0'
19.7.28.1 Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled'
19.7.4.1 Ensure 'Do not preserve zone information in file attachments' is set to 'Disabled'
19.7.4.2 Ensure 'Notify antivirus programs when opening attachments' is set to 'Enabled'
19.7.43.1 Ensure 'Always install with elevated privileges' is set to 'Disabled'
2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'
2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'
2.2.11 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'
2.2.12 Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE'
2.2.13 Ensure 'Create a pagefile' is set to 'Administrators'
2.2.14 Ensure 'Create a token object' is set to 'No One'
2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'
2.2.16 Ensure 'Create permanent shared objects' is set to 'No One'
2.2.18 Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines' (MS only)
2.2.19 Ensure 'Debug programs' is set to 'Administrators'
2.2.21 Ensure 'Deny access to this computer from the network' to include 'Guests, Local account and member of Administrators group' (MS only)
2.2.22 Ensure 'Deny log on as a batch job' to include 'Guests'
2.2.23 Ensure 'Deny log on as a service' to include 'Guests'
2.2.24 Ensure 'Deny log on locally' to include 'Guests'
2.2.26 Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account' (MS only)
2.2.28 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only)
2.2.29 Ensure 'Force shutdown from a remote system' is set to 'Administrators'
2.2.3 Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only)
2.2.30 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'
2.2.32 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' and (when the Web Server (IIS) Role with Web Services Role Service is installed) 'IIS_IUSRS' (MS only)
2.2.33 Ensure 'Increase scheduling priority' is set to 'Administrators'
2.2.34 Ensure 'Load and unload device drivers' is set to 'Administrators'
2.2.35 Ensure 'Lock pages in memory' is set to 'No One'
2.2.38 Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only)
2.2.39 Ensure 'Modify an object label' is set to 'No One'
2.2.4 Ensure 'Act as part of the operating system' is set to 'No One'
2.2.40 Ensure 'Modify firmware environment values' is set to 'Administrators'
2.2.41 Ensure 'Perform volume maintenance tasks' is set to 'Administrators'
2.2.42 Ensure 'Profile single process' is set to 'Administrators'
2.2.43 Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost'
2.2.44 Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'
2.2.45 Ensure 'Restore files and directories' is set to 'Administrators'
2.2.46 Ensure 'Shut down the system' is set to 'Administrators'
2.2.48 Ensure 'Take ownership of files or other objects' is set to 'Administrators'
2.2.6 Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'
2.2.7 Ensure 'Allow log on locally' is set to 'Administrators'
2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only)
2.3.1.1 Ensure 'Accounts: Administrator account status' is set to 'Disabled' (MS only)
2.3.1.2 Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only)
2.3.1.3 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'
2.3.10.1 Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled'
2.3.10.10 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'
2.3.10.11 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)
2.3.10.12 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None'
2.3.10.13 Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves'
2.3.10.2 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (MS only)
2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (MS only)
2.3.10.5 Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled'
2.3.10.7 Configure 'Network access: Named Pipes that can be accessed anonymously' (MS only)
2.3.10.8 Configure 'Network access: Remotely accessible registry paths' is configured
2.3.10.9 Configure 'Network access: Remotely accessible registry paths and sub-paths' is configured
2.3.11.1 Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to 'Enabled'
2.3.11.10 Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
2.3.11.2 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'
2.3.11.3 Ensure 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' is set to 'Disabled'
2.3.11.4 Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'
2.3.11.5 Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled'
2.3.11.6 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'
2.3.11.7 Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM'
2.3.11.8 Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher
2.3.11.9 Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
2.3.13.1 Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled'
2.3.15.1 Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled'
2.3.15.2 Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled'
2.3.16.1 Ensure 'System settings: Optional subsystems' is set to 'Defined: (blank)'
2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled'
2.3.17.2 Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop'
2.3.17.3 Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'
2.3.17.4 Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled'
2.3.17.5 Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled'
2.3.17.6 Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled'
2.3.17.7 Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled'
2.3.17.8 Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to 'Enabled'
2.3.2.1 Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'
2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'
2.3.4.1 Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators'
2.3.4.2 Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled'
2.3.6.1 Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'
2.3.6.2 Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'
2.3.6.3 Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled'
2.3.6.4 Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled'
2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0'
2.3.6.6 Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled'
2.3.7.1 Ensure 'Interactive logon: Do not display last user name' is set to 'Enabled'
2.3.7.2 Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled'
2.3.7.3 Configure 'Interactive logon: Message text for users attempting to log on'
2.3.7.4 Configure 'Interactive logon: Message title for users attempting to log on'
2.3.7.6 Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days'
2.3.7.7 Ensure 'Interactive logon: Require Domain Controller Authentication to unlock workstation' is set to 'Enabled' (MS only)
2.3.7.8 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher
2.3.8.1 Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled'
2.3.8.2 Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled'
2.3.8.3 Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled'
2.3.9.1 Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)'
2.3.9.2 Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'
2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'
2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'
2.3.9.5 Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or higher (MS only)
9.1.1 Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)'
9.1.2 Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)'
9.1.3 Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)'
9.1.4 Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No'
9.1.5 Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\domainfw.log'
9.1.6 Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater'
9.1.7 Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes'
9.1.8 Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes'
9.2.1 Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)'
9.2.2 Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)'
9.2.3 Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)'
9.2.4 Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No'
9.2.5 Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\privatefw.log'
9.2.6 Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater'
9.2.7 Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes'
9.2.8 Ensure 'Windows Firewall: Private: Logging: Log successful connections' is set to 'Yes'
9.3.1 Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)'
9.3.10 Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes'
9.3.2 Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)'
9.3.3 Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)'
9.3.4 Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'No'
9.3.5 Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No'
9.3.6 Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No'
9.3.7 Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\publicfw.log'
9.3.8 Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater'
9.3.9 Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes'