CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1

Audit Details

Name: CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1

Updated: 7/23/2024

Authority: CIS

Plugin: Windows

Revision: 1.4

Estimated Item Count: 254

File Details

Filename: CIS_MS_Windows_Server_2008_v3.3.1_DC_L1.audit

Size: 706 kB

MD5: f3d38dde82634912b76b3452059e561e
SHA256: 1c9c32ca9fbea041dfbb5305d0b9dd91af93a6efe63b83c41b11eec1cc71a8d0

Audit Changelog

Ā 
Revision 1.4

Jul 23, 2024

Miscellaneous
  • Variables updated.
Added
  • 1.1.1 (L1) Ensure 'Enforce password history' is set to '24 or more password(s)'
  • 1.1.2 (L1) Ensure 'Maximum password age' is set to '365 or fewer days, but not 0'
  • 1.1.3 (L1) Ensure 'Minimum password age' is set to '1 or more day(s)'
  • 1.1.4 (L1) Ensure 'Minimum password length' is set to '14 or more character(s)'
  • 1.1.5 (L1) Ensure 'Password must meet complexity requirements' is set to 'Enabled'
  • 1.1.6 (L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled'
  • 1.2.1 (L1) Ensure 'Account lockout duration' is set to '15 or more minute(s)'
  • 1.2.2 (L1) Ensure 'Account lockout threshold' is set to '5 or fewer invalid logon attempt(s), but not 0'
  • 1.2.3 (L1) Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'
  • 17.1.1 (L1) Ensure 'Audit Credential Validation' is set to 'Success and Failure'
  • 17.1.2 (L1) Ensure 'Audit Kerberos Authentication Service' is set to 'Success and Failure' (DC Only)
  • 17.1.3 (L1) Ensure 'Audit Kerberos Service Ticket Operations' is set to 'Success and Failure' (DC Only)
  • 17.2.1 (L1) Ensure 'Audit Application Group Management' is set to 'Success and Failure'
  • 17.2.2 (L1) Ensure 'Audit Computer Account Management' is set to include 'Success' (DC only)
  • 17.2.3 (L1) Ensure 'Audit Distribution Group Management' is set to include 'Success' (DC only)
  • 17.2.4 (L1) Ensure 'Audit Other Account Management Events' is set to include 'Success' (DC only)
  • 17.2.5 (L1) Ensure 'Audit Security Group Management' is set to include 'Success'
  • 17.2.6 (L1) Ensure 'Audit User Account Management' is set to 'Success and Failure'
  • 17.3.1 (L1) Ensure 'Audit Process Creation' is set to include 'Success'
  • 17.4.1 (L1) Ensure 'Audit Directory Service Access' is set to include 'Failure' (DC only)
  • 17.4.2 (L1) Ensure 'Audit Directory Service Changes' is set to include 'Success' (DC only)
  • 17.5.1 (L1) Ensure 'Audit Account Lockout' is set to include 'Failure'
  • 17.5.2 (L1) Ensure 'Audit Logoff' is set to include 'Success'
  • 17.5.3 (L1) Ensure 'Audit Logon' is set to 'Success and Failure'
  • 17.5.4 (L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'
  • 17.5.5 (L1) Ensure 'Audit Special Logon' is set to include 'Success'
  • 17.6.1 (L1) Ensure 'Audit File Share' is set to 'Success and Failure'
  • 17.6.2 (L1) Ensure 'Audit Other Object Access Events' is set to 'Success and Failure'
  • 17.7.1 (L1) Ensure 'Audit Audit Policy Change' is set to include 'Success'
  • 17.7.2 (L1) Ensure 'Audit Authentication Policy Change' is set to include 'Success'
  • 17.7.3 (L1) Ensure 'Audit Authorization Policy Change' is set to include 'Success'
  • 17.7.4 (L1) Ensure 'Audit MPSSVC Rule-Level Policy Change' is set to 'Success and Failure'
  • 17.7.5 (L1) Ensure 'Audit Other Policy Change Events' is set to include 'Failure'
  • 17.8.1 (L1) Ensure 'Audit Sensitive Privilege Use' is set to 'Success and Failure'
  • 17.9.1 (L1) Ensure 'Audit IPsec Driver' is set to 'Success and Failure'
  • 17.9.2 (L1) Ensure 'Audit Other System Events' is set to 'Success and Failure'
  • 17.9.3 (L1) Ensure 'Audit Security State Change' is set to include 'Success'
  • 17.9.4 (L1) Ensure 'Audit Security System Extension' is set to include 'Success'
  • 17.9.5 (L1) Ensure 'Audit System Integrity' is set to 'Success and Failure'
  • 18.3.2 (L1) Ensure 'Configure SMB v1 client' is set to 'Enabled: Bowser, MRxSmb20, NSI'
  • 18.3.3 (L1) Ensure 'Configure SMB v1 client driver' is set to 'Enabled: Disable driver (recommended)'
  • 18.3.4 (L1) Ensure 'Configure SMB v1 server' is set to 'Disabled'
  • 18.3.5 (L1) Ensure 'Enable Structured Exception Handling Overwrite Protection (SEHOP)' is set to 'Enabled'
  • 18.3.6 (L1) Ensure 'Extended Protection for LDAP Authentication (Domain Controllers only)' is set to 'Enabled: Enabled, always (recommended)' (DC Only)
  • 18.3.7 (L1) Ensure 'Limits print driver installation to Administrators' is set to 'Enabled'
  • 18.3.8 (L1) Ensure 'NetBT NodeType configuration' is set to 'Enabled: P-node (recommended)'
  • 18.4.1 (L1) Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled'
  • 18.4.12 (L1) Ensure 'MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning' is set to 'Enabled: 90% or less'
  • 18.4.2 (L1) Ensure 'MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled'
  • 18.4.3 (L1) Ensure 'MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled'
  • 18.4.4 (L1) Ensure 'MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes' is set to 'Disabled'
  • 18.4.6 (L1) Ensure 'MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers' is set to 'Enabled'
  • 18.4.8 (L1) Ensure 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)' is set to 'Enabled'
  • 18.4.9 (L1) Ensure 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)' is set to 'Enabled: 5 or fewer seconds'
  • 18.5.11.1 (L1) Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled'
  • 18.5.14.1 (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares'
  • 18.5.4.1 (L1) Ensure 'Configure DNS over HTTPS (DoH) name resolution' is set to 'Enabled: Allow DoH' or higher
  • 18.5.4.2 (L1) Ensure 'Turn off multicast name resolution' is set to 'Enabled'
  • 18.6.1 (L1) Ensure 'Allow Print Spooler to accept client connections' is set to 'Disabled'
  • 18.6.2 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'
  • 18.6.3 (L1) Ensure 'Point and Print Restrictions: When updating drivers for an existing connection' is set to 'Enabled: Show warning and elevation prompt'
  • 18.8.21.1 (L1) Ensure 'Configure registry policy processing: Do not apply during periodic background processing' is set to 'Enabled: FALSE'
  • 18.8.21.2 (L1) Ensure 'Configure registry policy processing: Process even if the Group Policy objects have not changed' is set to 'Enabled: TRUE'
  • 18.8.21.3 (L1) Ensure 'Turn off background refresh of Group Policy' is set to 'Disabled'
  • 18.8.22.1.1 (L1) Ensure 'Turn off downloading of print drivers over HTTP' is set to 'Enabled'
  • 18.8.22.1.4 (L1) Ensure 'Turn off Internet download for Web publishing and online ordering wizards' is set to 'Enabled'
  • 18.8.34.6.1 (L1) Ensure 'Require a password when a computer wakes (on battery)' is set to 'Enabled'
  • 18.8.34.6.2 (L1) Ensure 'Require a password when a computer wakes (plugged in)' is set to 'Enabled'
  • 18.8.36.1 (L1) Ensure 'Configure Offer Remote Assistance' is set to 'Disabled'
  • 18.8.36.2 (L1) Ensure 'Configure Solicited Remote Assistance' is set to 'Disabled'
  • 18.8.4.1 (L1) Ensure 'Encryption Oracle Remediation' is set to 'Enabled: Force Updated Clients'
  • 18.8.40.1 (L1) Ensure 'Configure validation of ROCA-vulnerable WHfB keys during authentication' is set to 'Enabled: Audit' or higher (DC only)
  • 18.8.7.1 (L1) Ensure 'Allow remote access to the Plug and Play interface' is set to 'Disabled'
  • 18.9.100.1 (L1) Ensure 'Turn on PowerShell Script Block Logging' is set to 'Enabled'
  • 18.9.100.2 (L1) Ensure 'Turn on PowerShell Transcription' is set to 'Disabled'
  • 18.9.102.1.1 (L1) Ensure 'Allow Basic authentication' is set to 'Disabled'
  • 18.9.102.1.2 (L1) Ensure 'Allow unencrypted traffic' is set to 'Disabled'
  • 18.9.102.1.3 (L1) Ensure 'Disallow Digest authentication' is set to 'Enabled'
  • 18.9.102.2.1 (L1) Ensure 'Allow Basic authentication' is set to 'Disabled'
  • 18.9.102.2.3 (L1) Ensure 'Allow unencrypted traffic' is set to 'Disabled'
  • 18.9.102.2.4 (L1) Ensure 'Disallow WinRM from storing RunAs credentials' is set to 'Enabled'
  • 18.9.108.1.1 (L1) Ensure 'Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box' is set to 'Disabled'
  • 18.9.108.1.2 (L1) Ensure 'Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box' is set to 'Disabled'
  • 18.9.108.1.3 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'
  • 18.9.108.1.4 (L1) Ensure 'Reschedule Automatic Updates scheduled installations' is set to 'Enabled: 1 minute'
  • 18.9.108.2.1 (L1) Ensure 'Configure Automatic Updates' is set to 'Enabled'
  • 18.9.108.2.2 (L1) Ensure 'Configure Automatic Updates: Scheduled install day' is set to '0 - Every day'
  • 18.9.16.1 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'
  • 18.9.19.1 (L1) Ensure 'Turn off desktop gadgets' is set to 'Enabled'
  • 18.9.19.2 (L1) Ensure 'Turn Off user-installed desktop gadgets' is set to 'Enabled'
  • 18.9.25.1 (L1) Ensure 'EMET 5.52' or higher is installed
  • 18.9.25.2 (L1) Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings)
  • 18.9.25.3 (L1) Ensure 'Default Protections for Internet Explorer' is set to 'Enabled'
  • 18.9.25.4 (L1) Ensure 'Default Protections for Popular Software' is set to 'Enabled'
  • 18.9.25.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled'
  • 18.9.25.6 (L1) Ensure 'System ASLR' is set to 'Enabled: Application Opt-In'
  • 18.9.25.7 (L1) Ensure 'System DEP' is set to 'Enabled: Application Opt-Out'
  • 18.9.25.8 (L1) Ensure 'System SEHOP' is set to 'Enabled: Application Opt-Out'
  • 18.9.27.1.1 (L1) Ensure 'Application: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
  • 18.9.27.1.2 (L1) Ensure 'Application: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
  • 18.9.27.2.1 (L1) Ensure 'Security: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
  • 18.9.27.2.2 (L1) Ensure 'Security: Specify the maximum log file size (KB)' is set to 'Enabled: 196,608 or greater'
  • 18.9.27.3.1 (L1) Ensure 'Setup: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
  • 18.9.27.3.2 (L1) Ensure 'Setup: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
  • 18.9.27.4.1 (L1) Ensure 'System: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
  • 18.9.27.4.2 (L1) Ensure 'System: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
  • 18.9.31.1 (L1) Ensure 'Turn off heap termination on corruption' is set to 'Disabled'
  • 18.9.31.2 (L1) Ensure 'Turn off shell protocol protected mode' is set to 'Disabled'
  • 18.9.47.15 (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'
  • 18.9.65.2.2 (L1) Ensure 'Do not allow passwords to be saved' is set to 'Enabled'
  • 18.9.65.3.11.1 (L1) Ensure 'Do not delete temp folders upon exit' is set to 'Disabled'
  • 18.9.65.3.11.2 (L1) Ensure 'Do not use temporary folders per session' is set to 'Disabled'
  • 18.9.65.3.3.2 (L1) Ensure 'Do not allow drive redirection' is set to 'Enabled'
  • 18.9.65.3.9.1 (L1) Ensure 'Always prompt for password upon connection' is set to 'Enabled'
  • 18.9.65.3.9.2 (L1) Ensure 'Require secure RPC communication' is set to 'Enabled'
  • 18.9.65.3.9.3 (L1) Ensure 'Require use of specific security layer for remote (RDP) connections' is set to 'Enabled: SSL'
  • 18.9.65.3.9.4 (L1) Ensure 'Require user authentication for remote connections by using Network Level Authentication' is set to 'Enabled'
  • 18.9.65.3.9.5 (L1) Ensure 'Set client connection encryption level' is set to 'Enabled: High Level'
  • 18.9.66.1 (L1) Ensure 'Prevent downloading of enclosures' is set to 'Enabled'
  • 18.9.67.2 (L1) Ensure 'Allow indexing of encrypted files' is set to 'Disabled'
  • 18.9.8.1 (L1) Ensure 'Set the default behavior for AutoRun' is set to 'Enabled: Do not execute any autorun commands'
  • 18.9.8.2 (L1) Ensure 'Turn off Autoplay' is set to 'Enabled: All drives'
  • 18.9.86.2.1 (L1) Ensure 'Configure Default consent' is set to 'Enabled: Always ask before sending data'
  • 18.9.90.1 (L1) Ensure 'Allow user control over installs' is set to 'Disabled'
  • 18.9.90.2 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'
  • 19.1.3.1 (L1) Ensure 'Enable screen saver' is set to 'Enabled'
  • 19.1.3.2 (L1) Ensure 'Force specific screen saver: Screen saver executable name' is set to 'Enabled: scrnsave.scr'
  • 19.1.3.3 (L1) Ensure 'Password protect the screen saver' is set to 'Enabled'
  • 19.1.3.4 (L1) Ensure 'Screen saver timeout' is set to 'Enabled: 900 seconds or fewer, but not 0'
  • 19.7.28.1 (L1) Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled'
  • 19.7.4.1 (L1) Ensure 'Do not preserve zone information in file attachments' is set to 'Disabled'
  • 19.7.4.2 (L1) Ensure 'Notify antivirus programs when opening attachments' is set to 'Enabled'
  • 19.7.43.1 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'
  • 2.2.1 (L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'
  • 2.2.10 (L1) Ensure 'Back up files and directories' is set to 'Administrators'
  • 2.2.11 (L1) Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'
  • 2.2.12 (L1) Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE'
  • 2.2.13 (L1) Ensure 'Create a pagefile' is set to 'Administrators'
  • 2.2.14 (L1) Ensure 'Create a token object' is set to 'No One'
  • 2.2.15 (L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'
  • 2.2.16 (L1) Ensure 'Create permanent shared objects' is set to 'No One'
  • 2.2.17 (L1) Ensure 'Create symbolic links' is set to 'Administrators' (DC only)
  • 2.2.18 (L1) Ensure 'Debug programs' is set to 'Administrators'
  • 2.2.19 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only)
  • 2.2.2 (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users, ENTERPRISE DOMAIN CONTROLLERS' (DC only)
  • 2.2.21 (L1) Ensure 'Deny log on as a batch job' to include 'Guests'
  • 2.2.22 (L1) Ensure 'Deny log on as a service' to include 'Guests'
  • 2.2.23 (L1) Ensure 'Deny log on locally' to include 'Guests'
  • 2.2.24 (L1) Ensure 'Deny log on through Remote Desktop Services' to include 'Guests' (DC only)
  • 2.2.26 (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'Administrators' (DC only)
  • 2.2.28 (L1) Ensure 'Force shutdown from a remote system' is set to 'Administrators'
  • 2.2.29 (L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'
  • 2.2.30 (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only)
  • 2.2.32 (L1) Ensure 'Load and unload device drivers' is set to 'Administrators'
  • 2.2.33 (L1) Ensure 'Lock pages in memory' is set to 'No One'
  • 2.2.35 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)
  • 2.2.37 (L1) Ensure 'Modify an object label' is set to 'No One'
  • 2.2.38 (L1) Ensure 'Modify firmware environment values' is set to 'Administrators'
  • 2.2.39 (L1) Ensure 'Perform volume maintenance tasks' is set to 'Administrators'
  • 2.2.4 (L1) Ensure 'Act as part of the operating system' is set to 'No One'
  • 2.2.40 (L1) Ensure 'Profile single process' is set to 'Administrators'
  • 2.2.41 (L1) Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'
  • 2.2.42 (L1) Ensure 'Restore files and directories' is set to 'Administrators'
  • 2.2.43 (L1) Ensure 'Shut down the system' is set to 'Administrators'
  • 2.2.44 (L1) Ensure 'Synchronize directory service data' is set to 'No One' (DC only)
  • 2.2.45 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators'
  • 2.2.5 (L1) Ensure 'Add workstations to domain' is set to 'Administrators' (DC only)
  • 2.2.6 (L1) Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'
  • 2.2.7 (L1) Ensure 'Allow log on locally' is set to 'Administrators'
  • 2.2.8 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only)
  • 2.3.1.3 (L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'
  • 2.3.1.4 (L1) Configure 'Accounts: Rename administrator account'
  • 2.3.1.5 (L1) Configure 'Accounts: Rename guest account'
  • 2.3.10.1 (L1) Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled'
  • 2.3.10.10 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'
  • 2.3.10.11 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None'
  • 2.3.10.12 (L1) Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves'
  • 2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled'
  • 2.3.10.6 (L1) Configure 'Network access: Named Pipes that can be accessed anonymously' (DC only)
  • 2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths' is configured
  • 2.3.10.9 (L1) Configure 'Network access: Remotely accessible registry paths and sub-paths' is configured
  • 2.3.11.1 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'
  • 2.3.11.2 (L1) Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled'
  • 2.3.11.3 (L1) Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'
  • 2.3.11.4 (L1) Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM'
  • 2.3.11.5 (L1) Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher
  • 2.3.11.6 (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
  • 2.3.11.7 (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
  • 2.3.13.1 (L1) Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled'
  • 2.3.15.1 (L1) Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled'
  • 2.3.15.2 (L1) Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled'
  • 2.3.16.1 (L1) Ensure 'System settings: Optional subsystems' is set to 'Defined: (blank)'
  • 2.3.17.1 (L1) Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled'
  • 2.3.17.2 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop'
  • 2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'
  • 2.3.17.4 (L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled'
  • 2.3.17.5 (L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled'
  • 2.3.17.6 (L1) Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled'
  • 2.3.17.7 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled'
  • 2.3.17.8 (L1) Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to 'Enabled'
  • 2.3.2.1 (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'
  • 2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'
  • 2.3.4.1 (L1) Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators'
  • 2.3.4.2 (L1) Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled'
  • 2.3.5.1 (L1) Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC only)
  • 2.3.5.2 (L1) Ensure 'Domain controller: LDAP server signing requirements' is set to 'Require signing' (DC only)
  • 2.3.5.3 (L1) Ensure 'Domain controller: Refuse machine account password changes' is set to 'Disabled' (DC only)
  • 2.3.6.1 (L1) Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'
  • 2.3.6.2 (L1) Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'
  • 2.3.6.3 (L1) Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled'
  • 2.3.6.4 (L1) Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled'
  • 2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0'
  • 2.3.6.6 (L1) Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled'
  • 2.3.7.1 (L1) Ensure 'Interactive logon: Do not display last user name' is set to 'Enabled'
  • 2.3.7.2 (L1) Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled'
  • 2.3.7.3 (L1) Configure 'Interactive logon: Message text for users attempting to log on'
  • 2.3.7.4 (L1) Configure 'Interactive logon: Message title for users attempting to log on'
  • 2.3.7.6 (L1) Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days'
  • 2.3.7.8 (L1) Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher
  • 2.3.8.1 (L1) Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled'
  • 2.3.8.2 (L1) Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled'
  • 2.3.8.3 (L1) Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled'
  • 2.3.9.1 (L1) Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)'
  • 2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'
  • 2.3.9.3 (L1) Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'
  • 2.3.9.4 (L1) Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'
  • 5.1 (L1) Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (DC only)
  • 9.1.1 (L1) Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)'
  • 9.1.2 (L1) Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)'
  • 9.1.3 (L1) Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)'
  • 9.1.4 (L1) Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No'
  • 9.1.5 (L1) Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\domainfw.log'
  • 9.1.6 (L1) Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater'
  • 9.1.7 (L1) Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes'
  • 9.1.8 (L1) Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes'
  • 9.2.1 (L1) Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)'
  • 9.2.2 (L1) Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)'
  • 9.2.3 (L1) Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)'
  • 9.2.4 (L1) Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No'
  • 9.2.5 (L1) Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\privatefw.log'
  • 9.2.6 (L1) Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater'
  • 9.2.7 (L1) Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes'
  • 9.2.8 (L1) Ensure 'Windows Firewall: Private: Logging: Log successful connections' is set to 'Yes'
  • 9.3.1 (L1) Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)'
  • 9.3.10 (L1) Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes'
  • 9.3.2 (L1) Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)'
  • 9.3.3 (L1) Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)'
  • 9.3.4 (L1) Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'No'
  • 9.3.5 (L1) Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No'
  • 9.3.6 (L1) Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No'
  • 9.3.7 (L1) Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\publicfw.log'
  • 9.3.8 (L1) Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater'
  • 9.3.9 (L1) Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes'
Removed
  • 1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'
  • 1.1.2 Ensure 'Maximum password age' is set to '365 or fewer days, but not 0'
  • 1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)'
  • 1.1.4 Ensure 'Minimum password length' is set to '14 or more character(s)'
  • 1.1.5 Ensure 'Password must meet complexity requirements' is set to 'Enabled'
  • 1.1.6 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'
  • 1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'
  • 1.2.2 Ensure 'Account lockout threshold' is set to '5 or fewer invalid logon attempt(s), but not 0'
  • 1.2.3 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'
  • 17.1.1 Ensure 'Audit Credential Validation' is set to 'Success and Failure'
  • 17.1.2 Ensure 'Audit Kerberos Authentication Service' is set to 'Success and Failure' (DC Only)
  • 17.1.3 Ensure 'Audit Kerberos Service Ticket Operations' is set to 'Success and Failure' (DC Only)
  • 17.2.1 Ensure 'Audit Application Group Management' is set to 'Success and Failure'
  • 17.2.2 Ensure 'Audit Computer Account Management' is set to include 'Success' (DC only)
  • 17.2.3 Ensure 'Audit Distribution Group Management' is set to include 'Success' (DC only)
  • 17.2.4 Ensure 'Audit Other Account Management Events' is set to include 'Success' (DC only)
  • 17.2.5 Ensure 'Audit Security Group Management' is set to include 'Success'
  • 17.2.6 Ensure 'Audit User Account Management' is set to 'Success and Failure'
  • 17.3.1 Ensure 'Audit Process Creation' is set to include 'Success'
  • 17.4.1 Ensure 'Audit Directory Service Access' is set to include 'Failure' (DC only)
  • 17.4.2 Ensure 'Audit Directory Service Changes' is set to include 'Success' (DC only)
  • 17.5.1 Ensure 'Audit Account Lockout' is set to include 'Failure'
  • 17.5.2 Ensure 'Audit Logoff' is set to include 'Success'
  • 17.5.3 Ensure 'Audit Logon' is set to 'Success and Failure'
  • 17.5.4 Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'
  • 17.5.5 Ensure 'Audit Special Logon' is set to include 'Success'
  • 17.6.1 Ensure 'Audit File Share' is set to 'Success and Failure'
  • 17.6.2 Ensure 'Audit Other Object Access Events' is set to 'Success and Failure'
  • 17.7.1 Ensure 'Audit Audit Policy Change' is set to include 'Success'
  • 17.7.2 Ensure 'Audit Authentication Policy Change' is set to include 'Success'
  • 17.7.3 Ensure 'Audit Authorization Policy Change' is set to include 'Success'
  • 17.7.4 Ensure 'Audit MPSSVC Rule-Level Policy Change' is set to 'Success and Failure'
  • 17.7.5 Ensure 'Audit Other Policy Change Events' is set to include 'Failure'
  • 17.8.1 Ensure 'Audit Sensitive Privilege Use' is set to 'Success and Failure'
  • 17.9.1 Ensure 'Audit IPsec Driver' is set to 'Success and Failure'
  • 17.9.2 Ensure 'Audit Other System Events' is set to 'Success and Failure'
  • 17.9.3 Ensure 'Audit Security State Change' is set to include 'Success'
  • 17.9.4 Ensure 'Audit Security System Extension' is set to include 'Success'
  • 17.9.5 Ensure 'Audit System Integrity' is set to 'Success and Failure'
  • 18.3.2 Ensure 'Configure SMB v1 client' is set to 'Enabled: Bowser, MRxSmb20, NSI'
  • 18.3.3 Ensure 'Configure SMB v1 client driver' is set to 'Enabled: Disable driver (recommended)'
  • 18.3.4 Ensure 'Configure SMB v1 server' is set to 'Disabled'
  • 18.3.5 Ensure 'Enable Structured Exception Handling Overwrite Protection (SEHOP)' is set to 'Enabled'
  • 18.3.6 Ensure 'Extended Protection for LDAP Authentication (Domain Controllers only)' is set to 'Enabled: Enabled, always (recommended)' (DC Only)
  • 18.3.7 Ensure 'Limits print driver installation to Administrators' is set to 'Enabled'
  • 18.3.8 Ensure 'NetBT NodeType configuration' is set to 'Enabled: P-node (recommended)'
  • 18.4.1 Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled'
  • 18.4.12 Ensure 'MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning' is set to 'Enabled: 90% or less'
  • 18.4.2 Ensure 'MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled'
  • 18.4.3 Ensure 'MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled'
  • 18.4.4 Ensure 'MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes' is set to 'Disabled'
  • 18.4.6 Ensure 'MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers' is set to 'Enabled'
  • 18.4.8 Ensure 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)' is set to 'Enabled'
  • 18.4.9 Ensure 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)' is set to 'Enabled: 5 or fewer seconds'
  • 18.5.11.1 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled'
  • 18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGON/RequireIntegrity
  • 18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGON/RequireMutualAuthentication
  • 18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOL/RequireIntegrity
  • 18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOL/RequireMutualAuthentication
  • 18.5.4.1 Ensure 'Configure DNS over HTTPS (DoH) name resolution' is set to 'Enabled: Allow DoH' or higher
  • 18.5.4.2 Ensure 'Turn off multicast name resolution' is set to 'Enabled'
  • 18.6.1 Ensure 'Allow Print Spooler to accept client connections' is set to 'Disabled'
  • 18.6.2 Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'
  • 18.6.3 Ensure 'Point and Print Restrictions: When updating drivers for an existing connection' is set to 'Enabled: Show warning and elevation prompt'
  • 18.8.21.1 Ensure 'Configure registry policy processing: Do not apply during periodic background processing' is set to 'Enabled: FALSE'
  • 18.8.21.2 Ensure 'Configure registry policy processing: Process even if the Group Policy objects have not changed' is set to 'Enabled: TRUE'
  • 18.8.21.3 Ensure 'Turn off background refresh of Group Policy' is set to 'Disabled'
  • 18.8.22.1.1 Ensure 'Turn off downloading of print drivers over HTTP' is set to 'Enabled'
  • 18.8.22.1.4 Ensure 'Turn off Internet download for Web publishing and online ordering wizards' is set to 'Enabled'
  • 18.8.34.6.1 Ensure 'Require a password when a computer wakes (on battery)' is set to 'Enabled'
  • 18.8.34.6.2 Ensure 'Require a password when a computer wakes (plugged in)' is set to 'Enabled'
  • 18.8.36.1 Ensure 'Configure Offer Remote Assistance' is set to 'Disabled'
  • 18.8.36.2 Ensure 'Configure Solicited Remote Assistance' is set to 'Disabled'
  • 18.8.4.1 Ensure 'Encryption Oracle Remediation' is set to 'Enabled: Force Updated Clients'
  • 18.8.40.1 Ensure 'Configure validation of ROCA-vulnerable WHfB keys during authentication' is set to 'Enabled: Audit' or higher (DC only)
  • 18.8.7.1 Ensure 'Allow remote access to the Plug and Play interface' is set to 'Disabled'
  • 18.9.100.1 Ensure 'Turn on PowerShell Script Block Logging' is set to 'Enabled'
  • 18.9.100.2 Ensure 'Turn on PowerShell Transcription' is set to 'Disabled'
  • 18.9.102.1.1 Ensure 'Allow Basic authentication' is set to 'Disabled'
  • 18.9.102.1.2 Ensure 'Allow unencrypted traffic' is set to 'Disabled'
  • 18.9.102.1.3 Ensure 'Disallow Digest authentication' is set to 'Enabled'
  • 18.9.102.2.1 Ensure 'Allow Basic authentication' is set to 'Disabled'
  • 18.9.102.2.3 Ensure 'Allow unencrypted traffic' is set to 'Disabled'
  • 18.9.102.2.4 Ensure 'Disallow WinRM from storing RunAs credentials' is set to 'Enabled'
  • 18.9.108.1.1 Ensure 'Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box' is set to 'Disabled'
  • 18.9.108.1.2 Ensure 'Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box' is set to 'Disabled'
  • 18.9.108.1.3 Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'
  • 18.9.108.1.4 Ensure 'Reschedule Automatic Updates scheduled installations' is set to 'Enabled: 1 minute'
  • 18.9.108.2.1 Ensure 'Configure Automatic Updates' is set to 'Enabled'
  • 18.9.108.2.2 Ensure 'Configure Automatic Updates: Scheduled install day' is set to '0 - Every day'
  • 18.9.16.1 Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'
  • 18.9.19.1 Ensure 'Turn off desktop gadgets' is set to 'Enabled'
  • 18.9.19.2 Ensure 'Turn Off user-installed desktop gadgets' is set to 'Enabled'
  • 18.9.25.1 Ensure 'EMET 5.52' or higher is installed
  • 18.9.25.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings)
  • 18.9.25.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - Anti Detours
  • 18.9.25.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - Banned Functions
  • 18.9.25.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - Deep Hooks
  • 18.9.25.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - Exploit Action
  • 18.9.25.3 Ensure 'Default Protections for Internet Explorer' is set to 'Enabled'
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - 7z.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - 7zG.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - FirefoxPluginContainer
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Foxit Reader.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - LYNC.EXE
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - OIS.EXE
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Photoshop.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - QuickTimePlayer.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Safari.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - SkyDrive.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Skype.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - ThunderbirdPluginContainer
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - WLXPhotoGallery.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - WindowsLiveWriter.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - chrome.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - communicator.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - firefox.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - googletalk.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - iTunes.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - mirc.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - opera.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - pidgin.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - rar.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - realconverter.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - realplay.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - thunderbird.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - unrar.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - vlc.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winamp.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winrar.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winzip32.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winzip64.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - wlmail.exe
  • 18.9.25.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - wmplayer.exe
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - AcroRd32.exe
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - Acrobat.exe
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - EXCEL.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - INFOPATH.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - LYNC.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - MSACCESS.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - MSPUB.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - OIS.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - OUTLOOK.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - POWERPNT.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - PPTVIEW.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - VISIO.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - VPREVIEW.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - WINWORD.EXE
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - java.exe
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - javaw.exe
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - javaws.exe
  • 18.9.25.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - wordpad.exe
  • 18.9.25.6 Ensure 'System ASLR' is set to 'Enabled: Application Opt-In'
  • 18.9.25.7 Ensure 'System DEP' is set to 'Enabled: Application Opt-Out'
  • 18.9.25.8 Ensure 'System SEHOP' is set to 'Enabled: Application Opt-Out'
  • 18.9.27.1.1 Ensure 'Application: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
  • 18.9.27.1.2 Ensure 'Application: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
  • 18.9.27.2.1 Ensure 'Security: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
  • 18.9.27.2.2 Ensure 'Security: Specify the maximum log file size (KB)' is set to 'Enabled: 196,608 or greater'
  • 18.9.27.3.1 Ensure 'Setup: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
  • 18.9.27.3.2 Ensure 'Setup: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
  • 18.9.27.4.1 Ensure 'System: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled'
  • 18.9.27.4.2 Ensure 'System: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater'
  • 18.9.31.1 Ensure 'Turn off heap termination on corruption' is set to 'Disabled'
  • 18.9.31.2 Ensure 'Turn off shell protocol protected mode' is set to 'Disabled'
  • 18.9.47.15 Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'
  • 18.9.65.2.2 Ensure 'Do not allow passwords to be saved' is set to 'Enabled'
  • 18.9.65.3.11.1 Ensure 'Do not delete temp folders upon exit' is set to 'Disabled'
  • 18.9.65.3.11.2 Ensure 'Do not use temporary folders per session' is set to 'Disabled'
  • 18.9.65.3.3.2 Ensure 'Do not allow drive redirection' is set to 'Enabled'
  • 18.9.65.3.9.1 Ensure 'Always prompt for password upon connection' is set to 'Enabled'
  • 18.9.65.3.9.2 Ensure 'Require secure RPC communication' is set to 'Enabled'
  • 18.9.65.3.9.3 Ensure 'Require use of specific security layer for remote (RDP) connections' is set to 'Enabled: SSL'
  • 18.9.65.3.9.4 Ensure 'Require user authentication for remote connections by using Network Level Authentication' is set to 'Enabled'
  • 18.9.65.3.9.5 Ensure 'Set client connection encryption level' is set to 'Enabled: High Level'
  • 18.9.66.1 Ensure 'Prevent downloading of enclosures' is set to 'Enabled'
  • 18.9.67.2 Ensure 'Allow indexing of encrypted files' is set to 'Disabled'
  • 18.9.8.1 Ensure 'Set the default behavior for AutoRun' is set to 'Enabled: Do not execute any autorun commands'
  • 18.9.8.2 Ensure 'Turn off Autoplay' is set to 'Enabled: All drives'
  • 18.9.86.2.1 Ensure 'Configure Default consent' is set to 'Enabled: Always ask before sending data'
  • 18.9.90.1 Ensure 'Allow user control over installs' is set to 'Disabled'
  • 18.9.90.2 Ensure 'Always install with elevated privileges' is set to 'Disabled'
  • 19.1.3.1 Ensure 'Enable screen saver' is set to 'Enabled'
  • 19.1.3.2 Ensure 'Force specific screen saver: Screen saver executable name' is set to 'Enabled: scrnsave.scr'
  • 19.1.3.3 Ensure 'Password protect the screen saver' is set to 'Enabled'
  • 19.1.3.4 Ensure 'Screen saver timeout' is set to 'Enabled: 900 seconds or fewer, but not 0'
  • 19.7.28.1 Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled'
  • 19.7.4.1 Ensure 'Do not preserve zone information in file attachments' is set to 'Disabled'
  • 19.7.4.2 Ensure 'Notify antivirus programs when opening attachments' is set to 'Enabled'
  • 19.7.43.1 Ensure 'Always install with elevated privileges' is set to 'Disabled'
  • 2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'
  • 2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'
  • 2.2.11 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'
  • 2.2.12 Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE'
  • 2.2.13 Ensure 'Create a pagefile' is set to 'Administrators'
  • 2.2.14 Ensure 'Create a token object' is set to 'No One'
  • 2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'
  • 2.2.16 Ensure 'Create permanent shared objects' is set to 'No One'
  • 2.2.17 Ensure 'Create symbolic links' is set to 'Administrators' (DC only)
  • 2.2.18 Ensure 'Debug programs' is set to 'Administrators'
  • 2.2.19 Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only)
  • 2.2.2 Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users, ENTERPRISE DOMAIN CONTROLLERS' (DC only)
  • 2.2.21 Ensure 'Deny log on as a batch job' to include 'Guests'
  • 2.2.22 Ensure 'Deny log on as a service' to include 'Guests'
  • 2.2.23 Ensure 'Deny log on locally' to include 'Guests'
  • 2.2.24 Ensure 'Deny log on through Remote Desktop Services' to include 'Guests' (DC only)
  • 2.2.26 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'Administrators' (DC only)
  • 2.2.28 Ensure 'Force shutdown from a remote system' is set to 'Administrators'
  • 2.2.29 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'
  • 2.2.30 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only)
  • 2.2.32 Ensure 'Load and unload device drivers' is set to 'Administrators'
  • 2.2.33 Ensure 'Lock pages in memory' is set to 'No One'
  • 2.2.35 Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)
  • 2.2.37 Ensure 'Modify an object label' is set to 'No One'
  • 2.2.38 Ensure 'Modify firmware environment values' is set to 'Administrators'
  • 2.2.39 Ensure 'Perform volume maintenance tasks' is set to 'Administrators'
  • 2.2.4 Ensure 'Act as part of the operating system' is set to 'No One'
  • 2.2.40 Ensure 'Profile single process' is set to 'Administrators'
  • 2.2.41 Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'
  • 2.2.42 Ensure 'Restore files and directories' is set to 'Administrators'
  • 2.2.43 Ensure 'Shut down the system' is set to 'Administrators'
  • 2.2.44 Ensure 'Synchronize directory service data' is set to 'No One' (DC only)
  • 2.2.45 Ensure 'Take ownership of files or other objects' is set to 'Administrators'
  • 2.2.5 Ensure 'Add workstations to domain' is set to 'Administrators' (DC only)
  • 2.2.6 Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'
  • 2.2.7 Ensure 'Allow log on locally' is set to 'Administrators'
  • 2.2.8 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only)
  • 2.3.1.3 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'
  • 2.3.1.4 Configure 'Accounts: Rename administrator account'
  • 2.3.1.5 Configure 'Accounts: Rename guest account'
  • 2.3.10.1 Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled'
  • 2.3.10.10 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'
  • 2.3.10.11 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None'
  • 2.3.10.12 Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves'
  • 2.3.10.5 Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled'
  • 2.3.10.6 Configure 'Network access: Named Pipes that can be accessed anonymously' (DC only)
  • 2.3.10.8 Configure 'Network access: Remotely accessible registry paths' is configured
  • 2.3.10.9 Configure 'Network access: Remotely accessible registry paths and sub-paths' is configured
  • 2.3.11.1 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'
  • 2.3.11.2 Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled'
  • 2.3.11.3 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'
  • 2.3.11.4 Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM'
  • 2.3.11.5 Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher
  • 2.3.11.6 Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
  • 2.3.11.7 Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
  • 2.3.13.1 Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled'
  • 2.3.15.1 Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled'
  • 2.3.15.2 Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled'
  • 2.3.16.1 Ensure 'System settings: Optional subsystems' is set to 'Defined: (blank)'
  • 2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled'
  • 2.3.17.2 Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop'
  • 2.3.17.3 Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'
  • 2.3.17.4 Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled'
  • 2.3.17.5 Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled'
  • 2.3.17.6 Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled'
  • 2.3.17.7 Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled'
  • 2.3.17.8 Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to 'Enabled'
  • 2.3.2.1 Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'
  • 2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'
  • 2.3.4.1 Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators'
  • 2.3.4.2 Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled'
  • 2.3.5.1 Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC only)
  • 2.3.5.2 Ensure 'Domain controller: LDAP server signing requirements' is set to 'Require signing' (DC only)
  • 2.3.5.3 Ensure 'Domain controller: Refuse machine account password changes' is set to 'Disabled' (DC only)
  • 2.3.6.1 Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'
  • 2.3.6.2 Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'
  • 2.3.6.3 Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled'
  • 2.3.6.4 Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled'
  • 2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0'
  • 2.3.6.6 Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled'
  • 2.3.7.1 Ensure 'Interactive logon: Do not display last user name' is set to 'Enabled'
  • 2.3.7.2 Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled'
  • 2.3.7.3 Configure 'Interactive logon: Message text for users attempting to log on'
  • 2.3.7.4 Configure 'Interactive logon: Message title for users attempting to log on'
  • 2.3.7.6 Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days'
  • 2.3.7.8 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher
  • 2.3.8.1 Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled'
  • 2.3.8.2 Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled'
  • 2.3.8.3 Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled'
  • 2.3.9.1 Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)'
  • 2.3.9.2 Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'
  • 2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'
  • 2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'
  • 5.1 Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (DC only)
  • 9.1.1 Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)'
  • 9.1.2 Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)'
  • 9.1.3 Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)'
  • 9.1.4 Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No'
  • 9.1.5 Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\domainfw.log'
  • 9.1.6 Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater'
  • 9.1.7 Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes'
  • 9.1.8 Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes'
  • 9.2.1 Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)'
  • 9.2.2 Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)'
  • 9.2.3 Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)'
  • 9.2.4 Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No'
  • 9.2.5 Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\privatefw.log'
  • 9.2.6 Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater'
  • 9.2.7 Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes'
  • 9.2.8 Ensure 'Windows Firewall: Private: Logging: Log successful connections' is set to 'Yes'
  • 9.3.1 Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)'
  • 9.3.10 Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes'
  • 9.3.2 Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)'
  • 9.3.3 Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)'
  • 9.3.4 Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'No'
  • 9.3.5 Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No'
  • 9.3.6 Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No'
  • 9.3.7 Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\publicfw.log'
  • 9.3.8 Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater'
  • 9.3.9 Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes'
Revision 1.3

Jun 17, 2024

Miscellaneous
  • Metadata updated.
Revision 1.2

Feb 12, 2024

Miscellaneous
  • Metadata updated.
  • Platform check updated.
Revision 1.1

Oct 6, 2023

Functional Update
  • 18.9.25.1 Ensure 'EMET 5.52' or higher is installed
Miscellaneous
  • References updated.