CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS

Audit Details

Name: CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS

Updated: 7/12/2024

Authority: CIS

Plugin: Windows

Revision: 1.0

Estimated Item Count: 237

File Details

Filename: CIS_Microsoft_Windows_Server_2019_STIG_v2.0.0_STIG_MS.audit

Size: 629 kB

MD5: 556e2c745293a8b85278de1690fef276
SHA256: df40265da945d1ea4f2d68fc2faa9d2125a3ceaf4cc9af4f407687e4c5eb12fd

Audit Items

DescriptionCategories
1.1.1 (L1) Ensure 'Enforce password history' is set to '24 or more password(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.3 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'

IDENTIFICATION AND AUTHENTICATION

1.1.4 (L1) Ensure 'Minimum password age' is set to '1 or more day(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.5 (L1) Ensure 'Minimum password length' is set to '14 or more character(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.6 (L1) Ensure 'Password must meet complexity requirements' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

1.1.7 (L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.1 (L1) Ensure 'Account lockout duration' is set to '15 or more minute(s)'

ACCESS CONTROL

1.2.3 Ensure 'Account lockout threshold' is set to '3 or fewer invalid logon attempt(s), but not 0'

ACCESS CONTROL

1.2.5 (L1) Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'

ACCESS CONTROL

2.2.1 (L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.3 (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only)

SYSTEM AND INFORMATION INTEGRITY

2.2.4 (L1) Ensure 'Act as part of the operating system' is set to 'No One'

ACCESS CONTROL

2.2.7 (L1) Ensure 'Allow log on locally' is set to 'Administrators'

ACCESS CONTROL

2.2.10 (L1) Ensure 'Back up files and directories' is set to 'Administrators'

ACCESS CONTROL

2.2.13 (L1) Ensure 'Create a pagefile' is set to 'Administrators'

ACCESS CONTROL

2.2.14 (L1) Ensure 'Create a token object' is set to 'No One'

ACCESS CONTROL

2.2.15 (L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'

ACCESS CONTROL

2.2.16 (L1) Ensure 'Create permanent shared objects' is set to 'No One'

ACCESS CONTROL

2.2.18 (L1) Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines' (MS only)

ACCESS CONTROL

2.2.20 (L1) Ensure 'Debug programs' is set to 'Administrators'

SYSTEM AND INFORMATION INTEGRITY

2.2.23 Ensure 'Deny access to this computer from the network' to include 'Guests, Enterprise Admins Group, Domains Admins Group, Local account, and member of Administrators group' (STIG MS only)

ACCESS CONTROL

2.2.26 Ensure 'Deny log on as a batch job' to include 'Guests, Enterprise Admins Group, and Domain Admins Group' (STIG MS only)

ACCESS CONTROL

2.2.29 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only)

ACCESS CONTROL

2.2.32 Ensure 'Deny log on locally' to include 'Guests, Enterprise Admins group, and Domain Admins group' (STIG MS only)

ACCESS CONTROL

2.2.35 Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account, Enterprise Admins Group, and Domain Admins Group' (STIG MS only)

ACCESS CONTROL

2.2.37 (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only)

ACCESS CONTROL

2.2.39 (L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.42 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (STIG MS only)

ACCESS CONTROL

2.2.44 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)

ACCESS CONTROL

2.2.45 (L1) Ensure 'Load and unload device drivers' is set to 'Administrators'

ACCESS CONTROL

2.2.46 (L1) Ensure 'Lock pages in memory' is set to 'No One'

ACCESS CONTROL

2.2.49 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only)

ACCESS CONTROL

2.2.51 (L1) Ensure 'Modify firmware environment values' is set to 'Administrators'

ACCESS CONTROL

2.2.52 (L1) Ensure 'Perform volume maintenance tasks' is set to 'Administrators'

ACCESS CONTROL

2.2.59 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators'

ACCESS CONTROL

2.3.1.3 Ensure 'Accounts: Guest account status' is set to 'Disabled' (STIG DC & MS only)

IDENTIFICATION AND AUTHENTICATION

2.3.1.4 (L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

2.3.1.5 (L1) Configure 'Accounts: Rename administrator account'

IDENTIFICATION AND AUTHENTICATION

2.3.1.6 (L1) Configure 'Accounts: Rename guest account'

IDENTIFICATION AND AUTHENTICATION

2.3.2.1 (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'

AUDIT AND ACCOUNTABILITY

2.3.6.1 (L1) Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.6.2 (L1) Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.6.3 (L1) Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

2.3.6.4 (L1) Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled'

IDENTIFICATION AND AUTHENTICATION

2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0'

IDENTIFICATION AND AUTHENTICATION

2.3.6.6 (L1) Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

2.3.7.3 (L1) Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not 0'

ACCESS CONTROL

2.3.7.4 (L1) Configure 'Interactive logon: Message text for users attempting to log on'

ACCESS CONTROL

2.3.7.5 (L1) Configure 'Interactive logon: Message title for users attempting to log on'

ACCESS CONTROL

2.3.7.6 (L2) Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to '4 or fewer logon(s)' (MS only)

IDENTIFICATION AND AUTHENTICATION