CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DC

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DC

Updated: 2/18/2025

Authority: CIS

Plugin: Windows

Revision: 1.3

Estimated Item Count: 269

File Details

Filename: CIS_Microsoft_Windows_Server_2022_STIG_v1.0.0_STIG_DC.audit

Size: 583 kB

MD5: 3314be98996e1197fd603eabd546693a
SHA256: 19f6909719cf3567ed8f4fe0b88de89c3cbcf48b9e03f5af4dbcd978acc069b2

Audit Items

DescriptionCategories
1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'
1.1.3 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' (STIG only)
1.1.4 Ensure 'Minimum password age' is set to '1 or more day(s)'
1.1.5 Ensure 'Minimum password length' is set to '14 or more character(s)'
1.1.6 Ensure 'Password must meet complexity requirements' is set to 'Enabled'
1.1.7 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'
1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'
1.2.3 Ensure 'Account lockout threshold' is set to '3 or fewer invalid logon attempt(s), but not 0' (STIG only)
1.2.5 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'
1.3.1 Ensure 'Enforce user logon restrictions' is set to 'Enabled' (STIG DC only)
1.3.2 Ensure 'Maximum lifetime for service ticket' is set to '600 or fewer minutes, but not 0' (STIG DC only)
1.3.3 Ensure 'Maximum lifetime for user ticket' is set to '10 or fewer hours, but not 0' (STIG DC only)
1.3.4 Ensure 'Maximum lifetime for user ticket renewal' is set to '7 or fewer days' (STIG DC only)
1.3.5 Ensure 'Maximum tolerance for computer clock synchronization' is set to '5 or fewer minutes' (STIG DC only)
2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'
2.2.2 Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users, ENTERPRISE DOMAIN CONTROLLERS' (DC only)
2.2.4 Ensure 'Act as part of the operating system' is set to 'No One'
2.2.5 Ensure 'Add workstations to domain' is set to 'Administrators' (DC only)
2.2.7 Ensure 'Allow log on locally' is set to 'Administrators'
2.2.8 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only)
2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'
2.2.13 Ensure 'Create a pagefile' is set to 'Administrators'
2.2.14 Ensure 'Create a token object' is set to 'No One'
2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'
2.2.16 Ensure 'Create permanent shared objects' is set to 'No One'
2.2.19 Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines'
2.2.21 Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only)
2.2.24 Ensure 'Deny log on as a batch job' to include 'Guests'
2.2.27 Ensure 'Deny log on as a service' to include 'No one' (STIG DC only)
2.2.30 Ensure 'Deny log on locally' to include 'Guests' (STIG DC only)
2.2.32 Ensure 'Deny log on through Remote Desktop Services' to include 'Guests' (DC only)
2.2.35 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'Administrators' (DC only)
2.2.37 Ensure 'Force shutdown from a remote system' is set to 'Administrators'
2.2.38 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'
2.2.39 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only)
2.2.43 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)
2.2.44 Ensure 'Load and unload device drivers' is set to 'Administrators'
2.2.45 Ensure 'Lock pages in memory' is set to 'No One'
2.2.48 Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)
2.2.51 Ensure 'Modify firmware environment values' is set to 'Administrators'
2.2.52 Ensure 'Perform volume maintenance tasks' is set to 'Administrators'
2.2.53 Ensure 'Profile single process' is set to 'Administrators'
2.2.56 Ensure 'Restore files and directories' is set to 'Administrators'
2.2.59 Ensure 'Take ownership of files or other objects' is set to 'Administrators'
2.3.1.3 Ensure 'Accounts: Guest account status' is set to 'Disabled' (STIG DC & MS only)
2.3.1.4 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'
2.3.1.5 Configure 'Accounts: Rename administrator account'
2.3.1.6 Configure 'Accounts: Rename guest account'
2.3.2.1 Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'
2.3.5.4 Ensure 'Domain controller: LDAP server signing requirements' is set to 'Require signing' (DC only)