CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DC

Audit Details

Name: CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DC

Updated: 7/9/2024

Authority: CIS

Plugin: Windows

Revision: 1.0

Estimated Item Count: 269

File Details

Filename: CIS_Microsoft_Windows_Server_2022_STIG_v1.0.0_STIG_DC.audit

Size: 712 kB

MD5: d1a9e1aeffafa5e533f7c131276b46ce
SHA256: b208fa02881b442fa386b26d4db53d8c32d5f003a7af90c070325b8812ab79ea

Audit Items

DescriptionCategories
1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.3 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' (STIG only)

IDENTIFICATION AND AUTHENTICATION

1.1.4 Ensure 'Minimum password age' is set to '1 or more day(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.5 Ensure 'Minimum password length' is set to '14 or more character(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.6 Ensure 'Password must meet complexity requirements' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

1.1.7 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'

ACCESS CONTROL

1.2.3 Ensure 'Account lockout threshold' is set to '3 or fewer invalid logon attempt(s), but not 0' (STIG only)

ACCESS CONTROL

1.2.5 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'

ACCESS CONTROL

1.3.1 Ensure 'Enforce user logon restrictions' is set to 'Enabled' (STIG DC only)

ACCESS CONTROL

1.3.2 Ensure 'Maximum lifetime for service ticket' is set to '600 or fewer minutes, but not 0' (STIG DC only)

IDENTIFICATION AND AUTHENTICATION

1.3.3 Ensure 'Maximum lifetime for user ticket' is set to '10 or fewer hours, but not 0' (STIG DC only)

IDENTIFICATION AND AUTHENTICATION

1.3.4 Ensure 'Maximum lifetime for user ticket renewal' is set to '7 or fewer days' (STIG DC only)

IDENTIFICATION AND AUTHENTICATION

1.3.5 Ensure 'Maximum tolerance for computer clock synchronization' is set to '5 or fewer minutes' (STIG DC only)

AUDIT AND ACCOUNTABILITY

2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.2 Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users, ENTERPRISE DOMAIN CONTROLLERS' (DC only)

SYSTEM AND INFORMATION INTEGRITY

2.2.4 Ensure 'Act as part of the operating system' is set to 'No One'

ACCESS CONTROL

2.2.5 Ensure 'Add workstations to domain' is set to 'Administrators' (DC only)

ACCESS CONTROL

2.2.7 Ensure 'Allow log on locally' is set to 'Administrators'

ACCESS CONTROL

2.2.8 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only)

ACCESS CONTROL

2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'

ACCESS CONTROL

2.2.13 Ensure 'Create a pagefile' is set to 'Administrators'

ACCESS CONTROL

2.2.14 Ensure 'Create a token object' is set to 'No One'

ACCESS CONTROL

2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'

ACCESS CONTROL

2.2.16 Ensure 'Create permanent shared objects' is set to 'No One'

ACCESS CONTROL

2.2.19 Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines'

ACCESS CONTROL

2.2.21 Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only)

ACCESS CONTROL

2.2.24 Ensure 'Deny log on as a batch job' to include 'Guests'

ACCESS CONTROL

2.2.27 Ensure 'Deny log on as a service' to include 'No one' (STIG DC only)

ACCESS CONTROL

2.2.30 Ensure 'Deny log on locally' to include 'Guests' (STIG DC only)

ACCESS CONTROL

2.2.32 Ensure 'Deny log on through Remote Desktop Services' to include 'Guests' (DC only)

ACCESS CONTROL

2.2.35 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'Administrators' (DC only)

ACCESS CONTROL

2.2.37 Ensure 'Force shutdown from a remote system' is set to 'Administrators'

ACCESS CONTROL

2.2.38 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.39 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only)

ACCESS CONTROL

2.2.43 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)

ACCESS CONTROL

2.2.44 Ensure 'Load and unload device drivers' is set to 'Administrators'

ACCESS CONTROL

2.2.45 Ensure 'Lock pages in memory' is set to 'No One'

ACCESS CONTROL

2.2.48 Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)

ACCESS CONTROL

2.2.51 Ensure 'Modify firmware environment values' is set to 'Administrators'

ACCESS CONTROL

2.2.52 Ensure 'Perform volume maintenance tasks' is set to 'Administrators'

ACCESS CONTROL

2.2.53 Ensure 'Profile single process' is set to 'Administrators'

ACCESS CONTROL

2.2.56 Ensure 'Restore files and directories' is set to 'Administrators'

ACCESS CONTROL

2.2.59 Ensure 'Take ownership of files or other objects' is set to 'Administrators'

ACCESS CONTROL

2.3.1.3 Ensure 'Accounts: Guest account status' is set to 'Disabled' (STIG DC & MS only)

IDENTIFICATION AND AUTHENTICATION

2.3.1.4 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

2.3.1.5 Configure 'Accounts: Rename administrator account'

IDENTIFICATION AND AUTHENTICATION

2.3.1.6 Configure 'Accounts: Rename guest account'

IDENTIFICATION AND AUTHENTICATION

2.3.2.1 Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'

AUDIT AND ACCOUNTABILITY

2.3.5.4 Ensure 'Domain controller: LDAP server signing requirements' is set to 'Require signing' (DC only)

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION