CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS

Updated: 2/18/2025

Authority: CIS

Plugin: Windows

Revision: 1.3

Estimated Item Count: 237

File Details

Filename: CIS_Microsoft_Windows_Server_2019_STIG_v2.0.0_STIG_MS.audit

Size: 513 kB

MD5: 2d71bba7eae73e48d1a2826af9cb8b2d
SHA256: ce09fd477d16a1750299ea14f3f3f0a5378d6a68366d097e1d942519501c8b76

Audit Items

DescriptionCategories
1.1.1 (L1) Ensure 'Enforce password history' is set to '24 or more password(s)'
1.1.3 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'
1.1.4 (L1) Ensure 'Minimum password age' is set to '1 or more day(s)'
1.1.5 (L1) Ensure 'Minimum password length' is set to '14 or more character(s)'
1.1.6 (L1) Ensure 'Password must meet complexity requirements' is set to 'Enabled'
1.1.7 (L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled'
1.2.1 (L1) Ensure 'Account lockout duration' is set to '15 or more minute(s)'
1.2.3 Ensure 'Account lockout threshold' is set to '3 or fewer invalid logon attempt(s), but not 0'
1.2.5 (L1) Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'
2.2.1 (L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'
2.2.3 (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only)
2.2.4 (L1) Ensure 'Act as part of the operating system' is set to 'No One'
2.2.7 (L1) Ensure 'Allow log on locally' is set to 'Administrators'
2.2.10 (L1) Ensure 'Back up files and directories' is set to 'Administrators'
2.2.13 (L1) Ensure 'Create a pagefile' is set to 'Administrators'
2.2.14 (L1) Ensure 'Create a token object' is set to 'No One'
2.2.15 (L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'
2.2.16 (L1) Ensure 'Create permanent shared objects' is set to 'No One'
2.2.18 (L1) Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines' (MS only)
2.2.20 (L1) Ensure 'Debug programs' is set to 'Administrators'
2.2.23 Ensure 'Deny access to this computer from the network' to include 'Guests, Enterprise Admins Group, Domains Admins Group, Local account, and member of Administrators group' (STIG MS only)
2.2.26 Ensure 'Deny log on as a batch job' to include 'Guests, Enterprise Admins Group, and Domain Admins Group' (STIG MS only)
2.2.29 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only)
2.2.32 Ensure 'Deny log on locally' to include 'Guests, Enterprise Admins group, and Domain Admins group' (STIG MS only)
2.2.35 Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account, Enterprise Admins Group, and Domain Admins Group' (STIG MS only)
2.2.37 (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only)
2.2.39 (L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'
2.2.42 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (STIG MS only)
2.2.44 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)
2.2.45 (L1) Ensure 'Load and unload device drivers' is set to 'Administrators'
2.2.46 (L1) Ensure 'Lock pages in memory' is set to 'No One'
2.2.49 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only)
2.2.51 (L1) Ensure 'Modify firmware environment values' is set to 'Administrators'
2.2.52 (L1) Ensure 'Perform volume maintenance tasks' is set to 'Administrators'
2.2.59 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators'
2.3.1.3 Ensure 'Accounts: Guest account status' is set to 'Disabled' (STIG DC & MS only)
2.3.1.4 (L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'
2.3.1.5 (L1) Configure 'Accounts: Rename administrator account'
2.3.1.6 (L1) Configure 'Accounts: Rename guest account'
2.3.2.1 (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'
2.3.6.1 (L1) Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'
2.3.6.2 (L1) Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'
2.3.6.3 (L1) Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled'
2.3.6.4 (L1) Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled'
2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0'
2.3.6.6 (L1) Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled'
2.3.7.3 (L1) Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not 0'
2.3.7.4 (L1) Configure 'Interactive logon: Message text for users attempting to log on'
2.3.7.5 (L1) Configure 'Interactive logon: Message title for users attempting to log on'
2.3.7.6 (L2) Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to '4 or fewer logon(s)' (MS only)