1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)' | IDENTIFICATION AND AUTHENTICATION |
1.1.3 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' (STIG only) | IDENTIFICATION AND AUTHENTICATION |
1.1.4 Ensure 'Minimum password age' is set to '1 or more day(s)' | IDENTIFICATION AND AUTHENTICATION |
1.1.5 Ensure 'Minimum password length' is set to '14 or more character(s)' | IDENTIFICATION AND AUTHENTICATION |
1.1.6 Ensure 'Password must meet complexity requirements' is set to 'Enabled' | IDENTIFICATION AND AUTHENTICATION |
1.1.7 Ensure 'Store passwords using reversible encryption' is set to 'Disabled' | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)' | ACCESS CONTROL |
1.2.3 Ensure 'Account lockout threshold' is set to '3 or fewer invalid logon attempt(s), but not 0' (STIG only) | ACCESS CONTROL |
1.2.5 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)' | ACCESS CONTROL |
2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.3 Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only) | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.4 Ensure 'Act as part of the operating system' is set to 'No One' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.7 Ensure 'Allow log on locally' is set to 'Administrators, ENTERPRISE DOMAIN CONTROLLERS' (DC only) | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.10 Ensure 'Back up files and directories' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.13 Ensure 'Create a pagefile' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.14 Ensure 'Create a token object' is set to 'No One' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.16 Ensure 'Create permanent shared objects' is set to 'No One' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.18 Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines' (MS only) | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.19 Ensure 'Debug programs' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.22 Ensure 'Deny access to this computer from the network' to include 'Guests, Enterprise Admins Group, Domains Admins Group, Local account, and member of Administrators group' (STIG MS only) | ACCESS CONTROL |
2.2.24 Ensure 'Deny log on as a batch job' to include 'Guests, Enterprise Admins Group, and Domain Admins Group' (STIG MS only) | ACCESS CONTROL |
2.2.27 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only) | ACCESS CONTROL |
2.2.29 Ensure 'Deny log on locally' to include 'Guests, Enterprise Admins group, and Domain Admins group' (STIG MS only) | ACCESS CONTROL |
2.2.32 Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account, Enterprise Admins Group, and Domain Admins Group' (STIG MS only) | ACCESS CONTROL |
2.2.34 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only) | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.35 Ensure 'Force shutdown from a remote system' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.36 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.39 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (STIG MS only) | ACCESS CONTROL |
2.2.40 Ensure 'Increase scheduling priority' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.41 Ensure 'Load and unload device drivers' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.42 Ensure 'Lock pages in memory' is set to 'No One' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.45 Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only) | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.48 Ensure 'Modify firmware environment values' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.49 Ensure 'Perform volume maintenance tasks' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.50 Ensure 'Profile single process' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.53 Ensure 'Restore files and directories' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.56 Ensure 'Take ownership of files or other objects' is set to 'Administrators' | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.3.1.3 Ensure 'Accounts: Guest account status' is set to 'Disabled' (STIG only) | IDENTIFICATION AND AUTHENTICATION |
2.3.1.4 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled' | IDENTIFICATION AND AUTHENTICATION |
2.3.1.5 Configure 'Accounts: Rename administrator account' | IDENTIFICATION AND AUTHENTICATION |
2.3.1.6 Configure 'Accounts: Rename guest account' | IDENTIFICATION AND AUTHENTICATION |
2.3.2.1 Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled' | AUDIT AND ACCOUNTABILITY |
2.3.6.1 Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled' | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.3.6.2 Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled' | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.3.6.3 Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled' | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.3.6.4 Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled' | ACCESS CONTROL |
2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | IDENTIFICATION AND AUTHENTICATION |
2.3.6.6 Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled' | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.3.7.3 Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not 0' | ACCESS CONTROL |