CIS Microsoft Windows Server 2019 STIG MS L1 v1.0.1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Microsoft Windows Server 2019 STIG MS L1 v1.0.1

Updated: 7/12/2024

Authority: CIS

Plugin: Windows

Revision: 1.15

Estimated Item Count: 310

File Details

Filename: CIS_Microsoft_Windows_Server_2019_STIG_v1.0.1_L1_MS.audit

Size: 772 kB

MD5: bf06ac780b9695c60fbe2e9492ae4f99
SHA256: 7396cbd11b2938a15e2c335ebc736cb35c57aa4e58c5a16ad88572746c8ff76f

Audit Items

DescriptionCategories
1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'
1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'
1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)'
1.1.4 Ensure 'Minimum password length' is set to '14 or more character(s)'
1.1.5 Ensure 'Password must meet complexity requirements' is set to 'Enabled'
1.1.6 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'
1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'
1.2.3 Ensure 'Account lockout threshold' is set to '10 or fewer invalid logon attempt(s), but not 0'
1.2.4 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'
2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'
2.2.3 Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only) - Administrators, Authenticated Users
2.2.4 Ensure 'Act as part of the operating system' is set to 'No One'
2.2.6 Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'
2.2.7 Ensure 'Allow log on locally' is set to 'Administrators'
2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only)
2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'
2.2.11 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'
2.2.12 Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE'
2.2.13 Ensure 'Create a pagefile' is set to 'Administrators'
2.2.14 Ensure 'Create a token object' is set to 'No One'
2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'
2.2.16 Ensure 'Create permanent shared objects' is set to 'No One'
2.2.18 Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines' (MS only)
2.2.20 Ensure 'Debug programs' is set to 'Administrators'
2.2.22 Ensure 'Deny access to this computer from the network' to include 'Guests, Local account and member of Administrators group' (MS only)
2.2.24 Ensure 'Deny log on as a batch job' to include 'Guests'
2.2.27 Ensure 'Deny log on as a service' to include 'Guests'
2.2.30 Ensure 'Deny log on locally' to include 'Guests'
2.2.34 Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account' (MS only)
2.2.37 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only)
2.2.38 Ensure 'Force shutdown from a remote system' is set to 'Administrators'
2.2.39 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'
2.2.41 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' and (when the Web Server (IIS) Role with Web Services Role Service is installed) 'IIS_IUSRS' (MS only)
2.2.43 Ensure 'Increase scheduling priority' is set to 'Administrators, Window Manager\Window Manager Group'
2.2.45 Ensure 'Load and unload device drivers' is set to 'Administrators'
2.2.46 Ensure 'Lock pages in memory' is set to 'No One'
2.2.50 Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only)
2.2.51 Ensure 'Modify an object label' is set to 'No One'
2.2.52 Ensure 'Modify firmware environment values' is set to 'Administrators'
2.2.53 Ensure 'Perform volume maintenance tasks' is set to 'Administrators'
2.2.54 Ensure 'Profile single process' is set to 'Administrators'
2.2.55 Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost'
2.2.56 Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'
2.2.57 Ensure 'Restore files and directories' is set to 'Administrators'
2.2.58 Ensure 'Shut down the system' is set to 'Administrators'
2.2.60 Ensure 'Take ownership of files or other objects' is set to 'Administrators'
2.3.1.1 Ensure 'Accounts: Administrator account status' is set to 'Disabled' (MS only)
2.3.1.2 Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'
2.3.1.3 Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only)
2.3.1.5 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'