CIS Windows Server 2008
CIS Windows Server 2008
Background.
CIS provides benchmarks, scoring tools, software, data, information, suggestions, ideas, and other services and
materials from the CIS website or elsewhere (Products) as a public service to Internet users worldwide.
Recommendations contained in the Products (Recommendations) result from a consensus-building process that
involves many security experts and are generally generic in nature. The Recommendations are intended to provide
helpful information to organizations attempting to evaluate or improve the security of their networks, systems and
devices. Proper use of the Recommendations requires careful analysis and adaptation to specific user requirements.
The Recommendations are not in any way intended to be a quick fix for anyones information security needs.
No representations, warranties and covenants.
CIS makes no representations, warranties or covenants whatsoever as to (i) the positive or negative effect of the
Products or the Recommendations on the operation or the security of any particular network, computer system,
network device, software, hardware, or any component of any of the foregoing or (ii) the accuracy, reliability,
timeliness or completeness of any Product or Recommendation. CIS is providing the Products and the
Recommendations as is and as available without representations, warranties or covenants of any kind.
User agreements.
By using the Products and/or the Recommendations, I and/or my organization (we) agree and acknowledge that:
No network, system, device, hardware, software or component can be made fully secure;
We are using the Products and the Recommendations solely at our own risk;
We are not compensating CIS to assume any liabilities associated with our use of the Products or the
Recommendations, even risks that result from CISs negligence or failure to perform;
We have the sole responsibility to evaluate the risks and benefits of the Products and Recommendations to us and
to adapt the Products and the Recommendations to our particular circumstances and requirements;
Neither CIS, nor any CIS Party (defined below) has any responsibility to make any corrections, updates, upgrades or
bug fixes or to notify us if it chooses at it sole option to do so; and
Neither CIS nor any CIS Party has or will have any liability to us whatsoever (whether based in contract, tort, strict
liability or otherwise) for any direct, indirect, incidental, consequential, or special damages (including without
limitation loss of profits, loss of sales, loss of or damage to reputation, loss of customers, loss of software, data,
information or emails, loss of privacy, loss of use of any computer or other equipment, business interruption,
wasted management or other staff resources or claims of any kind against us from third parties) arising out of or in
any way connected with our use of or our inability to use any of the Products or Recommendations (even if CIS has
been advised of the possibility of such damages), including without limitation any liability associated with
infringement of intellectual property, defects, bugs, errors, omissions, viruses, worms, backdoors, Trojan horses or
other harmful items.
Grant of limited rights.
CIS hereby grants each user the following rights, but only so long as the user complies with all of the terms of these
Agreed Terms of Use:
Except to the extent that we may have received additional authorization pursuant to a written agreement with CIS,
each user may download, install and use each of the Products on a single computer;
Each user may print one or more copies of any Product or any component of a Product that is in a .txt, .pdf, .doc,
.mcw, or .rtf format, provided that all such copies are printed in full and are kept intact, including without limitation
the text of this Agreed Terms of Use in its entirety.
3|Page
Table of Contents
Table of Contents ................................................................................................................................................... 4
Overview ................................................................................................................................................................ 10
Consensus Guidance ..................................................................................................................................................................10
Intended Audience .....................................................................................................................................................................10
Acknowledgements....................................................................................................................................................................10
Typographic Conventions .......................................................................................................................................................11
Security Profiles ..........................................................................................................................................................................11
Enterprise .................................................................................................................................................................................11
Specialized Security Limited Functionality (SSLF) ...............................................................................................11
Scoring ............................................................................................................................................................................................11
Not Defined ..............................................................................................................................................................................12
Not Configured ........................................................................................................................................................................12
1. Recommendations .................................................................................................................................... 12
1.1 Account Policies .............................................................................................................................................................12
1.1.1 Enforce password history ..................................................................................................................................12
1.1.2 Maximum password age .....................................................................................................................................12
1.1.3 Minimum password age .....................................................................................................................................13
1.1.4 Minimum password length ...............................................................................................................................14
1.1.5 Password must meet complexity requirements .......................................................................................14
1.1.6 Store passwords using reversible encryption ...........................................................................................15
1.1.7 Account lockout duration ..................................................................................................................................16
1.1.8 Account lockout threshold ................................................................................................................................16
1.1.9 Reset account lockout counter after ..............................................................................................................17
1.1.10
Enforce user logon restrictions ...................................................................................................................17
1.1.11
Maximum tolerance for computer clock synchronization ................................................................18
1.1.12
Maximum lifetime for service ticket..........................................................................................................19
1.1.13
Maximum lifetime for user ticket renewal .............................................................................................19
1.1.14
Maximum lifetime for user ticket ...............................................................................................................20
1.2 Audit Policy ......................................................................................................................................................................21
1.2.1 Audit account logon events ...............................................................................................................................21
1.2.2 Audit account management ..............................................................................................................................22
1.2.3 Audit directory service access .........................................................................................................................22
1.2.4 Audit logon events ................................................................................................................................................23
1.2.5 Audit object access ...............................................................................................................................................24
1.2.6 Audit policy change ..............................................................................................................................................24
1.2.7 Audit privilege use ................................................................................................................................................25
1.2.8 Audit process tracking ........................................................................................................................................25
1.2.9 Audit system events .............................................................................................................................................26
1.2.10
Audit: Shut down system immediately if unable to log security audits ......................................27
1.2.11
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit
policy category settings .......................................................................................................................................................27
1.3 Detailed Security Auditing .........................................................................................................................................28
1.3.1 Audit Policy: System: IPsec Driver .................................................................................................................28
1.3.2 Audit Policy: System: Security State Change ..............................................................................................29
1.3.3 Audit Policy: System: Security System Extension ....................................................................................30
1.3.4 Audit Policy: System: System Integrity.........................................................................................................31
1.3.5 Audit Policy: Logon-Logoff: Logoff .................................................................................................................31
1.3.6 Audit Policy: Logon-Logoff: Logon .................................................................................................................32
1.7.3 User Account Control: Behavior of the elevation prompt for standard users ...............................65
1.7.4 User Account Control: Detect application installations and prompt for elevation .....................65
1.7.5 User Account Control: Only elevate UIAccess applications that are installed in secure
locations ....................................................................................................................................................................................66
1.7.6 User Account Control: Run all administrators in Admin Approval Mode .......................................67
1.7.7 User Account Control: Switch to the secure desktop when prompting for elevation ................67
1.7.8 User Account Control: Virtualize file and registry write failures to per-user locations ............68
1.7.9 User Account Control: Allow UIAccess applications to prompt for elevation without using the
secure desktop ........................................................................................................................................................................69
1.8 User Rights .......................................................................................................................................................................69
1.8.1 Access this computer from the network ......................................................................................................69
1.8.2 Act as part of the operating system ...............................................................................................................70
1.8.3 Adjust memory quotas for a process .............................................................................................................71
1.8.4 Back up files and directories.............................................................................................................................71
1.8.5 Bypass traverse checking...................................................................................................................................72
1.8.6 Change the system time ......................................................................................................................................73
1.8.7 Create a pagefile ....................................................................................................................................................73
1.8.8 Create a token object ...........................................................................................................................................74
1.8.9 Create global objects ............................................................................................................................................74
1.8.10
Create permanent shared objects ..............................................................................................................75
1.8.11
Debug programs ................................................................................................................................................76
1.8.12
Deny access to this computer from the network ..................................................................................76
1.8.13
Enable computer and user accounts to be trusted for delegation .................................................77
1.8.14
Force shutdown from a remote system ...................................................................................................77
1.8.15
Impersonate a client after authentication...............................................................................................78
1.8.16
Increase scheduling priority.........................................................................................................................79
1.8.17
Load and unload device drivers ..................................................................................................................79
1.8.18
Lock pages in memory ....................................................................................................................................80
1.8.19
Manage auditing and security log...............................................................................................................81
1.8.20
Modify firmware environment values ......................................................................................................81
1.8.21
Perform volume maintenance tasks ..........................................................................................................82
1.8.22
Profile single process ......................................................................................................................................82
1.8.23
Profile system performance .........................................................................................................................83
1.8.24
Remove computer from docking station .................................................................................................84
1.8.25
Replace a process level token ......................................................................................................................84
1.8.26
Shut down the system .....................................................................................................................................85
1.8.27
Add workstations to domain ........................................................................................................................85
1.8.28
Allow log on locally ..........................................................................................................................................86
1.8.29
Allow log on through Terminal Services .................................................................................................86
1.8.30
Change the time zone ......................................................................................................................................87
1.8.31
Create symbolic links ......................................................................................................................................87
1.8.32
Deny log on locally ...........................................................................................................................................88
1.8.33
Deny log on through Terminal Services ...................................................................................................89
1.8.34
Generate security audits ................................................................................................................................89
1.8.35
Increase a process working set ...................................................................................................................90
1.8.36
Log on as a batch job .......................................................................................................................................91
1.8.37
Restore files and directories.........................................................................................................................91
1.8.38
Take ownership of files or other objects .................................................................................................92
1.8.39
Access credential Manager as a trusted caller.......................................................................................92
1.8.40
Synchronize directory service data ...........................................................................................................93
1.9 Security Options .............................................................................................................................................................94
6|Page
1.9.1 Network security: Minimum session security for NTLM SSP based (including secure RPC)
servers 94
1.9.2 Network access: Remotely accessible registry paths and sub-paths ................................................94
1.9.3 Accounts: Rename administrator account ..................................................................................................95
1.9.4 Accounts: Rename guest account....................................................................................................................96
1.9.5 Accounts: Guest account status .......................................................................................................................97
1.9.6 Network access: Allow anonymous SID/Name translation ..................................................................97
1.9.7 Accounts: Limit local account use of blank passwords to console logon only ..............................98
1.9.8 Devices: Allowed to format and eject removable media........................................................................99
1.9.9 Devices: Prevent users from installing printer drivers ..........................................................................99
1.9.10
Devices: Restrict CD-ROM access to locally logged-on user only ................................................ 100
1.9.11
Devices: Restrict floppy access to locally logged-on user only .................................................... 101
1.9.12
Domain member: Digitally encrypt or sign secure channel data (always) ............................. 102
1.9.13
Domain member: Digitally encrypt secure channel data (when possible) ............................. 102
1.9.14
Domain member: Digitally sign secure channel data (when possible) .................................... 103
1.9.15
Domain member: Disable machine account password changes ................................................. 104
1.9.16
Domain member: Maximum machine account password age ..................................................... 104
1.9.17
Domain member: Require strong (Windows 2000 or later) session key ................................ 105
1.9.18
Domain controller: Allow server operators to schedule tasks .................................................... 106
1.9.19
Domain controller: LDAP server signing requirements ................................................................. 107
1.9.20
Domain controller: Refuse machine account password changes ................................................ 107
1.9.21
Interactive logon: Do not display last user name .............................................................................. 108
1.9.22
Interactive logon: Do not require CTRL+ALT+DEL .......................................................................... 109
1.9.23
Interactive logon: Number of previous logons to cache (in case domain controller is not
available) 110
1.9.24
Interactive logon: Prompt user to change password before expiration .................................. 111
1.9.25
Interactive logon: Require Domain Controller authentication to unlock workstation ...... 112
1.9.26
Interactive logon: Smart card removal behavior .............................................................................. 113
1.9.27
Interactive logon: Message text for users attempting to log on .................................................. 114
1.9.28
Interactive logon: Message title for users attempting to log on .................................................. 114
1.9.29
Interactive logon: Require smart card................................................................................................... 115
1.9.30
Microsoft network client: Digitally sign communications (always) .......................................... 116
1.9.31
Microsoft network client: Digitally sign communications (if server agrees) ......................... 116
1.9.32
Microsoft network client: Send unencrypted password to third-party SMB servers ......... 117
1.9.33
Microsoft network server: Amount of idle time required before suspending session ....... 118
1.9.34
Microsoft network server: Digitally sign communications (always) ........................................ 118
1.9.35
Microsoft network server: Digitally sign communications (if client agrees) ......................... 119
1.9.36
Microsoft network server: Disconnect clients when logon hours expire ................................ 119
1.9.37
Network access: Do not allow anonymous enumeration of SAM accounts ............................ 120
1.9.38
Network access: Do not allow anonymous enumeration of SAM accounts and shares ..... 121
1.9.39
Network access: Do not allow storage of credentials or .NET Passports for network
authentication ...................................................................................................................................................................... 121
1.9.40
Network access: Let Everyone permissions apply to anonymous users ................................. 122
1.9.41
Network access: Named Pipes that can be accessed anonymously ........................................... 123
1.9.42
Network access: Remotely accessible registry paths ...................................................................... 124
1.9.43
Network access: Restrict anonymous access to Named Pipes and Shares .............................. 125
1.9.44
Network access: Shares that can be accessed anonymously ........................................................ 125
1.9.45
Network access: Sharing and security model for local accounts ................................................ 126
1.9.46
Network security: Do not store LAN Manager hash value on next password change ........ 126
1.9.47
Network security: LAN Manager authentication level .................................................................... 127
1.9.48
Network security: LDAP client signing requirements ..................................................................... 128
7|Page
1.9.49
clients
1.9.50
1.9.51
1.9.52
1.9.53
1.9.54
1.9.55
Links)
1.9.56
Network security: Minimum session security for NTLM SSP based (including secure RPC)
128
Recovery console: Allow automatic administrative logon ............................................................ 129
Recovery console: Allow floppy copy and access to all drives and all folders ....................... 130
Shutdown: Clear virtual memory pagefile ........................................................................................... 131
Shutdown: Allow system to be shut down without having to log on ........................................ 131
System objects: Require case insensitivity for non-Windows subsystems............................. 132
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic
132
System cryptography: Force strong key protection for user keys stored on the computer
133
1.9.57
System settings: Optional subsystems .................................................................................................. 134
1.9.58
System settings: Use Certificate Rules on Windows Executables for Software Restriction
Policies 134
1.9.59
MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)................................ 135
1.9.60
MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet
spoofing) 136
1.9.61
MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes ... 137
1.9.62
MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds ................... 137
1.9.63
MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic
138
1.9.64
MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release
requests except from WINS servers ............................................................................................................................ 139
1.9.65
MSS: (NtfsDisable8dot3NameCreation) Enable the computer to stop generating 8.3 style
filenames (recommended) .............................................................................................................................................. 140
1.9.66
MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway
addresses (could lead to DoS)........................................................................................................................................ 140
1.9.67
MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) .......................... 141
1.9.68
MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period
expires (0 recommended) ............................................................................................................................................... 142
1.9.69
MSS: (TCPMaxDataRetransmissions) How many times unacknowledged data is
retransmitted (3 recommended, 5 is default) ......................................................................................................... 142
1.9.70
MSS: (WarningLevel) Percentage threshold for the security event log at which the system
will generate a warning .................................................................................................................................................... 143
1.9.71
MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against
packet spoofing) .................................................................................................................................................................. 144
1.9.72
MSS: (TCPMaxDataRetransmissions) IPv6 How many times unacknowledged data is
retransmitted (3 recommended, 5 is default) ......................................................................................................... 144
1.10
Terminal Services ................................................................................................................................................... 145
1.10.1
Always prompt client for password upon connection .................................................................... 145
1.10.2
Set client connection encryption level................................................................................................... 146
1.10.3
Do not allow drive redirection ................................................................................................................. 146
1.10.4
Do not allow passwords to be saved ...................................................................................................... 147
1.11
Internet Communication ..................................................................................................................................... 148
1.11.1
Turn off downloading of print drivers over HTTP ........................................................................... 148
1.11.2
Turn off the "Publish to Web" task for files and folders ................................................................. 148
1.11.3
Turn off Internet download for Web publishing and online ordering wizards ..................... 149
1.11.4
Turn off printing over HTTP...................................................................................................................... 149
1.11.5
Turn off Search Companion content file updates .............................................................................. 150
1.11.6
Turn off the Windows Messenger Customer Experience Improvement Program ............... 150
1.11.7
Turn off Windows Update device driver searching.......................................................................... 151
8|Page
1.12
Additional Security Settings ............................................................................................................................... 152
1.12.1
Do not process the legacy run list ........................................................................................................... 152
1.12.2
Do not process the run once list............................................................................................................... 152
1.12.3
Registry policy processing ......................................................................................................................... 153
1.12.4
Offer Remote Assistance ............................................................................................................................. 154
1.12.5
Solicited Remote Assistance ...................................................................................................................... 155
1.12.6
Restrictions for Unauthenticated RPC clients .................................................................................... 155
1.12.7
RPC Endpoint Mapper Client Authentication ..................................................................................... 156
1.12.8
Turn off Autoplay ........................................................................................................................................... 157
1.12.9
Enumerate administrator accounts on elevation .............................................................................. 157
1.12.10 Require trusted path for credential entry ............................................................................................ 158
1.12.11 Disable remote Desktop Sharing ............................................................................................................. 159
Appendix A: References ................................................................................................................................ 160
Appendix B: Change History ....................................................................................................................... 161
9|Page
Overview
This document, Security Configuration Benchmark for Microsoft Windows Server 2008,
provides prescriptive guidance for establishing a secure configuration posture for
Microsoft Windows Server 2008 RTM and R2. This guide was tested against Microsoft
Windows Server 2008 RTM and R2. To obtain the latest version of this guide, please visit
http://cisecurity.org. If you have questions, comments, or have identified ways to improve
this guide, please write us at [email protected].
Consensus Guidance
This guide was created using a consensus review process comprised of volunteer and
contract subject matter experts. Consensus participants provide perspective from a diverse
set of backgrounds including consulting, software development, audit and compliance,
security research, operations, government, and legal.
Intended Audience
This document is intended for system and application administrators, security specialists,
auditors, help desk, and platform deployment personnel who plan to develop, deploy,
assess, or secure solutions that incorporate Microsoft Windows Server 2008.
Acknowledgements
The following individuals and organizations have demonstrated a commitment to the IT
security community by contributing greatly to the consensus review of this configuration
guide:
Maintainers
Susan Bradley
Jaime Castells, CISSP, CSSLP
Richard Manion
Phoram Mehta
Contributors
Phil Bassil
Sandya Boompelly, CA, Inc.
Frank Breedijk, Schuberg Philis
Jaime Castells, CISSP, CSSLP
Ron Colvin, NASA
Alan Carter Covell
Mike de Libero, MDE Development, LLC
Kurt Dillard
Dean Farrington, Wells Fargo
Blake Frantz, Center for Internet Security
Mike Gaal, Pacific Gas & Electric
Andre Gironda
CIS also extends special recognition to the authors of CIS Windows Server 2003
Benchmarks for setting the foundation for this Benchmark Jeff Shawgo, Sidney Faber, and
Collin Greene.
Additionally, Microsofts Security Compliance Management Toolkit was an excellent
resource in the development of this Benchmark. CIS also extends special recognition to
development team of those resources. Readers are encouraged to download the toolkit to
access many great resources, including tools such as GPOAccelerator and DCM
Configuration Packs, which aid in the rapid deployment of security configuration policies.
Typographic Conventions
The following typographical conventions are used throughout this guide:
Convention
Stylized Monospace font
Monospace font
<italic font in brackets>
Italic font
Note
Meaning
Used for blocks of code, command, and script examples.
Text should be interpreted exactly as presented.
Used for inline code, commands, or examples. Text should
be interpreted exactly as presented.
Italic texts set in angle brackets denote a variable
requiring substitution for a real value.
Used to denote the title of a book, article, or other
publication.
Additional information or caveats
Security Profiles
This section defines the profiles used throughout the Benchmark.
Enterprise
Settings in this level are designed for systems operating in a managed environment where
interoperability with legacy systems is not required. It assumes that all operating systems
within the enterprise are Windows XP SP3 or later and Windows Server 2003 SP2 of later.
In such environments, these Enterprise-level settings are not likely to affect the function or
performance of the OS. However, one should carefully consider the possible impact to
software applications when applying these recommended technical controls.
Scoring
This section defines the scoring statuses used within this document. The scoring status
indicates whether compliance with the given recommendation is discernible in an
automated manner.
11 | P a g e
Not Defined
These items do not impact a systems score as the Benchmark does not recommend a
specific value for this setting and profile combination.
Not Configured
The default behavior of Windows is commonly a secure behavior. For several settings,
Windows allows the administrator to reinforce the default behavior by enabling or
disabling a setting. Given this, for the Enterprise profiles, several settings are
recommended Not Configured as the default behavior is secure. For the SSLF profiles, the
Benchmark recommends that the default behavior be reinforced via GPO. An Enterprise
profile system that is configured in accordance with the SSLF profile recommendation is
not deemed out of conformance with this Benchmark.
1. Recommendations
1.1 Account Policies
1.1.1 Enforce password history
Description:
This control defines the number of unique passwords a user must leverage before a
previously used password can be reused. For all profiles, the recommended state for this
setting is 24 or more passwords remembered.
Rationale:
Enforcing a sufficiently long password history will increase the efficacy of password-based
authentication systems by reducing the opportunity for an attacker to leverage a known
credential. For example, if an attacker compromises a given credential that is then expired,
this control prevents the user from reusing that same compromised credential.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Account
Policies\Password Policy\Enforce password history
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
24 passwords remembered
References:
CCE-2237-6
This control defines how many days a user can use the same password before it expires.
For all profiles, the recommended state for this setting is 90 days or less.
Rationale:
Enforcing a reasonably short password age will increase the efficacy of password-based
authentication systems by reducing the opportunity for an attacker to leverage a known
credential.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Account
Policies\Password Policy\Maximum password age
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
42 days
References:
CCE-2200-4
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
0 days
References:
13 | P a g e
CCE-1861-4
Rationale:
Enforcing a minimum password length helps protect against brute force and dictionary
attacks, and increases the efficacy of password-based authentication systems.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Account
Policies\Password Policy\Minimum password length
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
0 characters
References:
CCE-2240-0
14 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Disabled
References:
CCE-2126-1
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Disabled
References:
CCE-2289-7
15 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Not defined
References:
CCE-1317-7
For the SSLF profile(s), the recommended value is 10 invalid logon attempts.
For the Enterprise profile(s), the recommended value is 15 invalid logon
attempts.
Rationale:
Enforcing an account lockout threshold will almost eliminated the effectiveness of
automated brute force password attacks and improves the security of a system.
Remediation:
16 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Account
Policies\Account Lockout Policy\Account lockout threshold
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
0 invalid logon attempts
References:
CCE-1872-1
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
0
References:
CCE-2311-9
17 | P a g e
This control defines Kerberos-related attributes of domain user accounts, such as the
Maximum lifetime for user ticket and Enforce user logon restrictions settings. It is
recommended that this setting be configured as described below:
For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the
recommended value is Enabled.
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is Not Defined.
Rationale:
Disabling this policy setting, users could receive session tickets for services that they no
longer have the right to use because the right was removed after they logged on, so this
policy setting should be enabled.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Account
Policies\Kerberos Policy\Enforce user logon restrictions
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Enabled
References:
CCE-8594-4
For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the
recommended value is 5.
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is Not Defined.
Rationale:
Kerberos leverages timestamps as a mitigation for defending against ticket replay attacks.
For this mechanism to be effective, the clocks of Kerberos participants must be closely
synchronized.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
18 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
5
References:
CCE-8268-5
For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the
recommended value is 600.
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is Not Defined.
Rationale:
Establishing a low ticket lifetime will ensure that user accounts that have been disabled or
are restricted by logon hours are unable to access Kerberized resources with a ticket that
was granted prior to the account being disabled or logon hours taking effect.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Account
Policies\Kerberos Policy\Maximum lifetime for service ticket
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
600
References:
CCE-8585-2
19 | P a g e
This control defines the number of days during which a user`s ticket-grating ticket (TGT)
can be renewed. It is recommended that this setting be configured as described below:
For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the
recommended value is 7 days.
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is Not Defined.
Rationale:
Establishing a low ticket lifetime will ensure that user accounts that have been disabled or
are restricted by logon hours are unable to access Kerberized resources with a ticket that
was granted prior to the account being disabled or logon hours taking effect.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Account
Policies\Kerberos Policy\Maximum lifetime for user ticket renewal
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
7 days
References:
CCE-8000-2
For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the
recommended value is 10.
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is Not Defined.
Rationale:
Establishing a low ticket lifetime will ensure that user accounts that have been disabled or
are restricted by logon hours are unable to access Kerberized resources with a ticket that
was granted prior to the account being disabled or logon hours taking effect.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
20 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
10
References:
CCE-8409-5
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
21 | P a g e
Default Value:
No auditing
References:
CCE-2251-7
CCE-1779-8
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No auditing
References:
CCE-2211-1
CCE-2538-7
22 | P a g e
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Audit Policy\Audit directory service access
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No auditing
References:
CCE-2215-2
CCE-2582-5
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No auditing
References:
CCE-2242-6
CCE-2574-2
23 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No auditing
References:
CCE-2136-0
CCE-2217-8
Audit:
24 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No auditing
References:
CCE-2433-1
CCE-2512-2
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No auditing
References:
CCE-2035-4
CCE-2265-7
25 | P a g e
When this option is enabled, an event is generated each time an application or a user starts,
stops, or otherwise changes a process. This creates a very large event log very quickly, and
the information is not normally exceptionally useful, unless you are tracking a very specific
behavior. Auditing process tracking is not required, and is only recommended when
absolutely necessary.
Caution: Enabling this setting may generate an excessive amount of log entries. For all
profiles, the recommended state for this setting is Not Defined.
Rationale:
It is recommended that audit subcategories be leveraged instead of legacy audit policies. A
system is not considered less secure if this policy is set to Success and/or Failure.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Audit Policy\Audit process tracking
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No auditing
References:
CCE-2295-4
CCE-1895-2
26 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No auditing
References:
CCE-1837-4
CCE-1939-8
1.2.10 Audit: Shut down system immediately if unable to log security audits
Description:
This setting causes the system to shut down if it is unable to log a security event to the
Security Event log. For all profiles, the recommended state for this setting is Disabled.
Rationale:
The risk of causing irreparable damage to the operating system, applications, or data
coupled with the unavailability of services provided by the system due to it being
immediately shut down typically greatly outweigh the risk of being unable to log a Security
event.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Audit: Shut down system immediately if unable to
log security audits
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v crashonauditfail
Default Value:
Disabled
References:
CCE-2315-0
1.2.11 Audit: Force audit policy subcategory settings (Windows Vista or later) to
override audit policy category settings
Description:
27 | P a g e
This setting causes Windows to respect audit subcategories in favor of the legacy audit
policies. For all profiles, the recommended state for this setting is Enabled.
Rationale:
Before Windows Server 2008 R2, no GPOs existed for configuring audit subcategories. As a
result, subcategory audit policies established with auditpol.exe were trumped in favor of
the legacy audit policy pushed over GPO. Enabling this setting causes the local system to
favor the audit subcategories over the legacy audit policy.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Audit: Force audit policy subcategory settings
(Windows Vista or later) to override audit policy category settings
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v
scenoapplylegacyauditpolicy
Default Value:
Not defined
References:
CCE-2276-4
28 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy
Object\System\Audit IPSec Driver\Audit Policy: System: IPsec Driver
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"IPsec Driver"
Default Value:
No auditing
References:
CCE-2608-8
CCE-2351-5
Audit:
29 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Security State Change"
Default Value:
Success
References:
CCE-2414-1
CCE-2448-9
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Security System Extension"
Default Value:
No auditing
References:
CCE-1841-6
CCE-2545-2
30 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"System Integrity"
Default Value:
Success and Failure
References:
CCE-2348-1
CCE-2440-6
31 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Logoff"
Default Value:
Success and Failure
References:
CCE-2569-2
CCE-2616-1
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Success and Failure.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Success.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy
Object\Logon/Logoff\Audit Logon\Audit Policy: Logon-Logoff: Logon
32 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Logon"
Default Value:
Success
References:
CCE-2441-4
CCE-2470-3
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Special Logon"
Default Value:
Success
References:
CCE-2610-4
CCE-2558-5
33 | P a g e
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Failure.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is No auditing.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy Object\Object
Access\Audit File System\Audit Policy: Object Access: File System
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"File System"
Default Value:
No auditing
References:
CCE-2531-2
CCE-2488-5
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Failure.
34 | P a g e
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is No auditing.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy Object\Object
Access\Audit Registry\Audit Policy: Object Access: Registry
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Registry"
Default Value:
No auditing
References:
CCE-2553-6
CCE-2505-6
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is No auditing.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Success and Failure.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
Remediation:
35 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy
Object\Privilege Use\Audit Sensitive Privilege Use\Audit Policy: Privilege
Use: Sensitive Privilege Use
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Sensitive Privilege Use"
Default Value:
No auditing
References:
CCE-2205-3
CCE-2349-9
36 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Process Creation"
Default Value:
No auditing
References:
CCE-2002-4
CCE-2375-4
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Audit Policy Change"
Default Value:
Success
References:
CCE-2433-1
CCE-2269-9
CCE-2268-1
37 | P a g e
CCE-2512-2
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Authentication Policy Change"
Default Value:
Success
References:
CCE-2566-8
CCE-2151-9
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Success and Failure.
38 | P a g e
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Success.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy
Object\Account Management\Audit Computer Account Management\Audit Policy:
Account Management: Computer Account Management
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Computer Account Management"
Default Value:
Success
References:
CCE-2288-9
CCE-2415-8
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Success and Failure.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Success.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
39 | P a g e
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy
Object\Account Management\Audit Other Account Management Events\Audit Policy:
Account Management: Other Account Management Events
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Other Account Management Events"
Default Value:
No auditing
References:
CCE-2485-1
CCE-2062-8
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Success and Failure.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Success.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy
40 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Security Group Management"
Default Value:
Success
References:
CCE-2443-0
CCE-2560-1
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Success and Failure.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Success.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy
Object\Account Management\Audit User Account Management\Audit Policy: Account
Management: User Account Management
41 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"User Account Management"
Default Value:
Success
References:
CCE-2394-5
CCE-2411-7
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is No auditing.
For the SSLF Domain Controller profile(s), the recommended value is Success
and Failure.
For the Enterprise Domain Controller profile(s), the recommended value is
Success.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy Object\DS
Access\Audit Directory Service Access\Audit Policy: DS Access: Directory
Service Access
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Directory Service Access"
42 | P a g e
Default Value:
No auditing
References:
CCE-2367-1
CCE-1926-5
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is No auditing.
For the SSLF Domain Controller profile(s), the recommended value is Success
and Failure.
For the Enterprise Domain Controller profile(s), the recommended value is
Success.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy Object\DS
Access\Audit Directory Service Changes\Audit Policy: DS Access: Directory
Service Changes
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Directory Service Changes"
Default Value:
No auditing
References:
CCE-2635-1
43 | P a g e
CCE-2445-5
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Success and Failure.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Success.
Rationale:
Enforcing audit settings allows for security incidents to be detected and enough evidence to
be available for analysis of those incidents. Certain regulated industries require the logging
of certain events and activities.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Advanced Audit
Policy Configuration\System Audit Policies - Local Group Policy
Object\Account Logon\Audit Credential Validation\Audit Policy: Account Logon:
Credential Validation
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. To audit the system using auditpol.exe, perform the following:
auditpol /get /subcategory:"Credential Validation"
Default Value:
Success
References:
CCE-2463-8
CCE-2516-3
44 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\EventLog\Application /v
MaxSize
Default Value:
20480 KB
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
45 | P a g e
Default Value:
Disabled
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\EventLog\Security /v
MaxSize
Default Value:
20480 KB
46 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\EventLog\Security /v
Retention
Default Value:
Disabled
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\EventLog\System /v MaxSize
Default Value:
20480 KB
47 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\EventLog\System /v
Retention
Default Value:
Disabled
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\IcmpSettings
/v
AllowInboundEchoRequest,AllowInboundMaskRequest,AllowInboundRouterRequest,All
owInboundTimestampRequest,AllowOutboundDestinationUnreachable,AllowOutboundPa
cketTooBig,AllowOutboundParameterProblem,AllowOutboundSourceQuench,AllowOutbo
undTimeExceeded,AllowRedirect
48 | P a g e
This control defines the set of Internet Control Message Protocol (ICMP) message types
that Windows Firewall allows. For all profiles, the recommended state for this setting is
Disabled.
Rationale:
Disabling this setting to in conjunction with window firewall prevents attackers to take
advantage of computers that accept ICMP message types.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\Network\Network
Connections\Windows Firewall \Standard Profile\Windows Firewall: Allow ICMP
exceptions (Standard)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings
/v
AllowInboundEchoRequest,AllowInboundMaskRequest,AllowInboundRouterRequest,All
owInboundTimestampRequest,AllowOutboundDestinationUnreachable,AllowOutboundPa
cketTooBig,AllowOutboundParameterProblem,AllowOutboundSourceQuench,AllowOutbo
undTimeExceeded,AllowRedirect
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Configured.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is No.
Rationale:
Enforcing and restricting access to this control will limit the potential for user with
administrative privileges to create connection security rules that expose the system to
remote attacks.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
49 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\DomainProfile /v
AllowLocalIPsecPolicyMerge
Default Value:
No
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Configured.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is No.
Rationale:
Configuring the system as recommended will limit the potential for a user with
administrative privileges to create a connection security rule that exposes the system to
remote attacks. When this control is set to 'No' only firewalls rules defined in Group Policy
are respected.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Windows Firewall
with Advanced Security\Windows Firewall with Advanced Security\Windows
Firewall Properties\Private Profile Tab\Windows Firewall: Apply local
connection security rules (Private)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile /v
AllowLocalIPsecPolicyMerge
50 | P a g e
Default Value:
No
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\PublicProfile /v
AllowLocalIPsecPolicyMerge
Default Value:
No
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Configured.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is No.
Rationale:
Configuring the system as recommended will limit the potential for a user with
administrative privileges to create a firewall rule that exposes the system to remote
51 | P a g e
attacks. When this control is set to 'No' only firewalls rules defined in Group Policy are
respected.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Windows Firewall
with Advanced Security\Windows Firewall with Advanced Security\Windows
Firewall Properties\Domain Profile Tab\Windows Firewall: Apply local firewall
rules (Domain)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\DomainProfile /v
AllowLocalPolicyMerge
Default Value:
Yes
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Configured.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is No.
Rationale:
Configuring the system as recommended will limit the potential for a user with
administrative privileges to create a firewall rule that exposes the system to remote
attacks. When this control is set to 'No' only firewalls rules defined in Group Policy are
respected.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Windows Firewall
with Advanced Security\Windows Firewall with Advanced Security\Windows
Firewall Properties\Private Profile Tab\Windows Firewall: Apply local
firewall rules (Private)
52 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile /v
AllowLocalPolicyMerge
Default Value:
Yes
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\PublicProfile /v
AllowLocalPolicyMerge
Default Value:
Yes
53 | P a g e
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Yes.
Rationale:
Notifying the user that an application is attempting to add a firewall exception may alert
the user of unexpected application behavior that will increase the remote attack surface of
the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Windows Firewall
with Advanced Security\Windows Firewall with Advanced Security\Windows
Firewall Properties\Domain Profile Tab\Windows Firewall: Display a
notification (Domain)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\DomainProfile /v
DisableNotifications
Default Value:
Yes
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Yes.
Rationale:
Notifying the user that an application is attempting to add a firewall exception may alert
the user of unexpected application behavior that will increase the remote attack surface of
the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
54 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile /v
DisableNotifications
Default Value:
Yes
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\PublicProfile /v
DisableNotifications
Default Value:
Yes
55 | P a g e
This control defines if the Windows Firewall will use the settings for this profile to filter
network traffic. If set to off, the Windows Firewall will not use any of the firewall rules or
connection security rules for this profile. For all profiles, the recommended state for this
setting is On.
Rationale:
Enabling the Windows Firewall for this profile will reduce the remote attack surface of the
system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Windows Firewall
with Advanced Security\Windows Firewall with Advanced Security\Windows
Firewall Properties\Domain Profile Tab\Windows Firewall: Firewall state
(Domain)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\DomainProfile /v
EnableFirewall
Default Value:
On
Audit:
56 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile /v
EnableFirewall
Default Value:
On
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\PublicProfile /v
EnableFirewall
Default Value:
On
57 | P a g e
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Windows Firewall
with Advanced Security\Windows Firewall with Advanced Security\Windows
Firewall Properties\Domain Profile Tab\Windows Firewall: Inbound connections
(Domain)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\DomainProfile /v
DefaultInboundAction
Default Value:
Block
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile /v
DefaultInboundAction
Default Value:
Block
58 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\WindowsFirewall\PublicProfile /v
DefaultInboundAction
Default Value:
Block
Audit:
59 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile /v
DisableNotifications
Default Value:
Disabled
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile /v
DisableNotifications
Default Value:
Disabled
60 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\Network\Network
Connections\Windows Firewall\Domain Profile\Windows Firewall: Protect all
network connections (Domain)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile /v
EnableFirewall
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile /v
EnableFirewall
61 | P a g e
Rationale:
Establishing automated means to deploy and apply system updates will help ensure the
system always has the most recent critical operating system updates and service packs
installed. It is recommended that organizations align this option with their patch policy. For
more information on patch management, see
http://csrc.nist.gov/publications/nistpubs/800-40-Ver2/SP800-40v2.pdf.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\Windows Components\Windows
Update\Configure Automatic Updates
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU /v
AUOptions
Default Value:
Download the updates automatically and notify when they are ready to be
installed
References:
CCE-8478-0
1.6.2 Do not display 'Install Updates and Shut Down' option in Shut Down
Windows dialog box
Description:
This control defines whether the Install Updates and Shut Down option is displayed in the
Shut Down Windows dialog box. For all profiles, the recommended state for this setting is
Disabled.
Rationale:
Ensuring that the 'Install Updates and Shut Down' option is visible in the shut down
Windows dialog will reinforce the positive behavior of installing security updates.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\Windows Components\Windows
Update\Do not display 'Install Updates and Shut Down' option in Shut Down
Windows dialog box
62 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU /v
NoAUShutdownOption
Default Value:
Disabled
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU /v
RescheduleWaitTimeEnabled
Default Value:
Disabled
References:
CCE-7646-3
63 | P a g e
Rationale:
Configuring the system as recommended will extend the security benefits of UAC to the
Built-in Administrator account.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Admin Approval Mode for the
Built-in Administrator account
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
FilterAdministratorToken
Default Value:
Disabled
References:
CCE-2302-8
Audit:
64 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
ConsentPromptBehaviorAdmin
Default Value:
Prompt for consent
References:
CCE-2474-5
1.7.3 User Account Control: Behavior of the elevation prompt for standard users
Description:
This control defines the behavior of Windows when a standard user attempts to complete a
task requiring raised privileges. For all profiles, the recommended state for this setting is
Automatically deny elevation requests.
Rationale:
Standard users will not have credentials required to approve the elevation request.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Behavior of the elevation
prompt for standard users
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
ConsentPromptBehaviorUser
Default Value:
Prompt for credentials
References:
CCE-2355-6
1.7.4 User Account Control: Detect application installations and prompt for
elevation
Description:
This control defines how Windows responds to application installation requests. For all
profiles, the recommended state for this setting is Enabled.
65 | P a g e
Rationale:
Configuring the system as recommended will help ensure that users and administrators are
aware of and explicitly approve software installations.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Detect application
installations and prompt for elevation
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
EnableInstallerDetection
Default Value:
Enabled
References:
CCE-2487-7
1.7.5 User Account Control: Only elevate UIAccess applications that are
installed in secure locations
Description:
This control helps protect Windows by only allowing applications installed in a secure
location, such as %ProgramFiles% and %SystemRoot%\System32, to run with elevated
privileges. For all profiles, the recommended state for this setting is Enabled.
Rationale:
Configuring the system as recommended will help reduce the probability of elevating the
privileges of an application that may have been created or altered by a malicious user.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Only elevate UIAccess
applications that are installed in secure locations
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
66 | P a g e
Default Value:
Enabled
References:
CCE-2473-7
1.7.6 User Account Control: Run all administrators in Admin Approval Mode
Description:
This control is the UAC on/off switch and defines whether users and administrators are
prompted when they attempt to perform administrative operations. For all profiles, the
recommended state for this setting is Enabled.
Rationale:
Leveraging UAC will make it more difficult for a compromised process that is executing
under the context of an administrative user to silently change Windows settings.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Run all administrators in
Admin Approval Mode
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
EnableLUA
Default Value:
Enabled
References:
CCE-2478-6
1.7.7 User Account Control: Switch to the secure desktop when prompting for
elevation
Description:
This control defines whether the UAC elevation prompt is displayed on the secure desktop.
For all profiles, the recommended state for this setting is Enabled.
Rationale:
67 | P a g e
Configuring the system as recommended will limit the potential for malicious software to
obtain credentials used for elevation.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Switch to the secure desktop
when prompting for elevation
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
PromptOnSecureDesktop
Default Value:
Enabled
References:
CCE-2500-7
1.7.8 User Account Control: Virtualize file and registry write failures to per-user
locations
Description:
This control defines whether Windows will virtualize file and registry writes to user
locations when a non-UAC compliant application attempts to write to protected areas, such
as the %SYSTEMROOT%. For all profiles, the recommended state for this setting is
Enabled.
Rationale:
Configuring the system as recommended will limit the potential vulnerabilities caused by
applications writing data to unpermitted locations on the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Virtualize file and registry
write failures to per-user locations
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
68 | P a g e
Default Value:
Enabled
References:
CCE-2266-5
1.7.9 User Account Control: Allow UIAccess applications to prompt for elevation
without using the secure desktop
Description:
This control defines whether an application is allowed to prompt for elevation without
using the secure desktop. For all profiles, the recommended state for this setting is
Disabled.
Rationale:
Configuring the system as recommended will limit the potential for malicious software to
obtain credentials used for elevation.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Allow UIAccess applications
to prompt for elevation without using the secure desktop
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v
EnableUIADesktopToggle
Default Value:
Disabled
References:
CCE-2434-9
69 | P a g e
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is Administrators, Authenticated Users.
For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the
recommended value is Administrators, Authenticated Users, ENTERPRISE
DOMAIN CONTROLLERS.
Rationale:
Configuring the system as recommended will ensure only authorized accounts can access
the local computer from the network.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Access this computer from the network
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Everyone, Administrators, Users, Backup Operators
References:
CCE-2075-0
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No one
70 | P a g e
References:
CCE-2079-2
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Administrators, LOCAL SERVICE, NETWORK SERVICE.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Limiting the grant of this right will help minimize the chance of a user maliciously or
unintentionally impacting system performance, which may result in a denial of service.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Adjust memory quotas for a process
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
LOCAL SERVICE, NETWORK SERVICE, Administrators
References:
CCE-2004-0
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Administrators.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Configuring the system as recommended will reduce the probability of unauthorized
disclosure of historic sensitive data. Additionally, restricting the grant of this right will limit
the exposure to user maliciously or unintentionally overwriting data that is more recent.
71 | P a g e
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Back up files and directories
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators, Backup Operators
References:
CCE-1321-9
For the Enterprise Domain Controller profile(s), the recommended value is Not
Defined.
For the SSLF Domain Controller profile(s), the recommended value is
Authenticated Users, Local Service, Network Service.
For the SSLF Member Server profile(s), the recommended value is
Administrators, Authenticated Users, Local Service, Network Service.
Rationale:
Enforcing or disabling access to this control slightly reduces the potential for unauthorized
access to information.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Bypass traverse checking
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
72 | P a g e
References:
CCE-2285-5
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
LOCAL SERVICE, Administrators
References:
CCE-2290-5
For the Enterprise Member Server,SSLF Member Server and SSLF Domain
Controller profile(s), the recommended value is Administrators.
For the Enterprise Domain Controller profile(s), the recommended value is Not
Defined.
Rationale:
Configuring the system as recommended will reduce the probability of a user negatively
impacting system performance by modifying the size of the pagefile.
Remediation:
73 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Create a pagefile
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators, SERVICE, Local Service, Network Service
References:
CCE-1328-4
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No One
References:
CCE-1491-0
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
74 | P a g e
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Administrators, SERVICE, Local Service, Network
Service.
Rationale:
Enforcing and restricting access to this control will limit the potential for application failure
and data corruption.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Create global objects
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators, SERVICE, Local Service, Network Service
References:
CCE-2226-9
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No One
References:
CCE-1341-7
75 | P a g e
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Administrators.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is No one.
Rationale:
Configuring the system as recommended will reduce the probability for a malicious local
user to circumvent application or system security control or view sensitive information
loaded in memory.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Debug programs
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-2310-1
76 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Guests
References:
CCE-2314-3
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No One
References:
CCE-1481-1
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Administrators.
77 | P a g e
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Configuring the system as recommended will limit the potential for denial of service (DoS)
attack.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Local Policies\User Rights
Assignment\Force shutdown from a remote system
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-1750-9
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
78 | P a g e
References:
CCE-1346-6
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Administrators.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Restricting which users can increase scheduling priorities will reduce the probability of the
system performance becoming severely degraded due to unintentional or malicious
changes to process priority.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Increase scheduling priority
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-2328-3
79 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Load and unload device drivers
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-1455-5
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is No one.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Configuring the system as recommended will limit the potential for a application to
consume large quantities of memory which may reduce system performance or result in a
denial of services (DoS) attack by.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Lock pages in memory
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No one
References:
CCE-2332-5
80 | P a g e
For the Enterprise Member Server,SSLF Member Server and SSLF Domain
Controller profile(s), the recommended value is Administrators.
For the Enterprise Domain Controller profile(s), the recommended value is Not
Defined.
Rationale:
Enforcing and restricting access to this control will limit the potential for a user to erase
evidence of unauthorized activity.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Manage auditing and security log
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-1843-2
For the Enterprise Member Server,SSLF Member Server and SSLF Domain
Controller profile(s), the recommended value is Administrators.
For the Enterprise Domain Controller profile(s), the recommended value is Not
Defined.
Rationale:
Configuring the system as recommended will limit the potential for a hardware failure, data
corruption or denial of service caused by unauthorized users.
Remediation:
81 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Modify firmware environment values
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-2257-4
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Administrators.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Configuring the system as recommended will limit the potential for a volume to be deleted
or corruption by unauthorized users.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Perform volume maintenance tasks
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-1383-9
82 | P a g e
This control defines whether a user is allowed to use tools to monitor the performance of
non-system processes. For all profiles, the recommended state for this setting is
Administrators.
Rationale:
Configuring the system as recommended will limit the potential for unauthorized users to
gain additional information to perform an attack on the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Profile single process
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-2360-6
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-2113-9
83 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-2382-0
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
LOCAL SERVICE, NETWORK SERVICE
84 | P a g e
References:
CCE-1527-1
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators, Backup Operators
References:
CCE-2078-4
For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the
recommended value is Administrators.
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is Not Defined.
Rationale:
Configuring the system as recommended will ensure that only authorized workstations are
added to the domain.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
85 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Not defined (Authenticated Users for domain controllers)
References:
CCE-2246-7
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators, Backup Operators, Performance Log Users
References:
CCE-2286-3
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Allow log on through Terminal Services
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators, Remote Desktop Users
References:
CCE-2308-5
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
LOCAL SERVICE, Administrators, Users
References:
CCE-2171-7
87 | P a g e
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Administrators.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Configuring the system as recommended will limit the potential for users to exploit
security vulnerabilities in applications that are not designed to use symbolic links.
Symbolic link attacks could be used to change permissions on files, corrupt data, destroy
data, or perform denial of service (DoS) attacks.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Create symbolic links
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-2305-1
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Guests
88 | P a g e
References:
CCE-2296-2
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No One
References:
CCE-2102-2
For the Enterprise Member Server,SSLF Member Server and SSLF Domain
Controller profile(s), the recommended value is LOCAL SERVICE, NETWORK
SERVICE.
For the Enterprise Domain Controller profile(s), the recommended value is Not
Defined.
Rationale:
Accounts granted this right could use this capability to create a high volume of security
events. This may result in increased difficulty identifying malicious activities in the event
log. Additionally, if the security event log is configured to overwrite entries as needed, this
capability may be used to erase evidence of security related events.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
89 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Local Service, Network Service
References:
CCE-2129-5
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Administrators, Local Service.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
This right is granted to the Users group by default. However, it is possible for a user to
increase their process working set to a level that could severely degrade system
performance and potentially cause a denial of service on the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Increase a process working set
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Users
References:
CCE-2306-9
90 | P a g e
For the Enterprise Domain Controller,SSLF Member Server and SSLF Domain
Controller profile(s), the recommended value is No one.
For the Enterprise Member Server profile(s), the recommended value is Not
Defined.
Rationale:
Granting a user rights introduces little risk. However, this use rights is not typically
required by standard user accounts. On system's running IIS or ASP.NET, the IIS_WPG
group and the IUSR_<ComputerName>, ASPNET, and IWAM_<ComputerName> accounts require
this user right for IIS to function properly.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Log on as a batch job
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators, Backup Operators, Performance Log Users
References:
CCE-1975-2
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Administrators.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Administrators, Backup Operators.
Rationale:
Account that possess this user right can gain access to sensitive data, corrupting and
overwriting information as well as perform denial of service (DoS) attacks against the
system.
91 | P a g e
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local Policies\User
Rights Assignment\Restore files and directories
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators, Backup Operators
References:
CCE-2294-7
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrators
References:
CCE-2506-4
92 | P a g e
Rationale:
The Credential Manager is the only entity that should have this right. A user possessing this
right can obtain the credentials for other users.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Local Policies\User Rights
Assignment\Access credential Manager as a trusted caller
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
No One
References:
CCE-2026-3
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Not defined
References:
CCE-2137-8
93 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa\MSV1_0 /v
NTLMMinServerSec
Default Value:
No minimum
References:
CCE-2410-9
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is:
System\CurrentControlSet\Control\Print\Printers
System\CurrentControlSet\Services\Eventlog
Software\Microsoft\OLAP Server
Software\Microsoft\Windows NT\CurrentVersion\Print
Software\Microsoft\Windows NT\CurrentVersion\Windows
94 | P a g e
System\CurrentControlSet\Control\ContentIndex
System\CurrentControlSet\Control\Terminal Server
System\CurrentControlSet\Control\Terminal Server\UserConfig
System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration
Software\Microsoft\Windows NT\CurrentVersion\Perflib
System\CurrentControlSet\Services\SysmonLog
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Restricting the remote accessibility of registry paths reduces the remote attack surface of
the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Network access: Remotely accessible registry paths
and sub-paths
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query
HKLM\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedPaths
/v Machine
Default Value:
System\CurrentControlSet\Control\Print\Printers
System\CurrentControlSet\Services\Eventlog
Software\Microsoft\OLAP Server
Software\Microsoft\Windows NT\CurrentVersion\Print
Software\Microsoft\Windows NT\CurrentVersion\Windows
System\CurrentControlSet\Control\ContentIndex
System\CurrentControlSet\Control\Terminal Server
System\CurrentControlSet\Control\Terminal Server\UserConfig
System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration
Software\Microsoft\Windows NT\CurrentVersion\Perflib
System\CurrentControlSet\Services\SysmonLog
References:
CCE-2357-2
95 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Administrator
References:
CCE-2227-7
96 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Guest
References:
CCE-2372-1
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Disabled
References:
CCE-2342-4
97 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Local Policies\Security
Options\Network access: Allow anonymous SID/Name translation
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed.
Default Value:
Disabled
References:
CCE-2318-4
1.9.7 Accounts: Limit local account use of blank passwords to console logon
only
Description:
Windows divides computer logons into two main types: console or local logons and remote
logons. In a console logon, the user physically logs on to the device with the attached
keyboard. Remote logons are performed across the network using various protocols such
as RPC, telnet, FTP and remote desktop.
When this setting is enabled, the computer refuses remote logons if the user attempts to
use a blank password, even if the blank password is valid for that account. This setting
should be enabled even though passwords should never be left blank.
For all profiles, the recommended state for this setting is Enabled.
Rationale:
Refuses remote authentication requests for account with blank passwords helps ensure
that only authorized users can access the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Accounts: Limit local account use of blank
passwords to console logon only
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v LimitBlankPasswordUse
Default Value:
98 | P a g e
Enabled
References:
CCE-2364-8
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon /v
AllocateDASD
Default Value:
Administrators
References:
CCE-2377-0
99 | P a g e
Beware of the syntax for this option: Enabled means the users will not be able to install
printer drivers and may prevent proper setup of printers; Disabled allows the user to fully
manage their own printers.
For all profiles, the recommended state for this setting is Enabled.
Rationale:
Preventing users from installing printer drivers reduces the probability of a user impacting
the stability and security of Windows.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Devices: Prevent users from installing printer
drivers
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Print\Providers\LanMan Print
Services\Servers /v AddPrinterDrivers
Default Value:
Enabled
References:
CCE-2152-7
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Enabling this feature will limit the potential for unauthorized users to gain access to
sensitive information on a mounted CD remotely.
100 | P a g e
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Devices: Restrict CD-ROM access to locally loggedon user only
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon /v
AllocateCDRoms
Default Value:
Disabled
References:
CCE-1390-4
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Enabling this setting will limit the potential for unauthorized users to gain access to
sensitive information on a mounted floppy remotely.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Devices: Restrict floppy access to locally loggedon user only
101 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon /v
AllocateFloppies
Default Value:
Disabled
References:
CCE-2383-8
1.9.12 Domain member: Digitally encrypt or sign secure channel data (always)
Description:
This control defines whether a signature or encryption is required for all secure channel
traffic initiated by domain members. For all profiles, the recommended state for this setting
is Enabled.
Rationale:
Digitally signing and encrypting secure channel data will reduce the probability of a
successful man in the middle attack while protecting the confidentiality of data traversing
the channel.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Domain member: Digitally encrypt or sign secure
channel data (always)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Netlogon\Parameters /v
requiresignorseal
Default Value:
Enabled
References:
CCE-2203-8
1.9.13 Domain member: Digitally encrypt secure channel data (when possible)
Description:
102 | P a g e
This control defines whether a system will try to negotiate encryption for all secure
channel traffic initiated by domain members. For all profiles, the recommended state for
this setting is Enabled.
Rationale:
Digitally encrypting secure channel data will protect the confidentiality of data traversing
the channel.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Domain member: Digitally encrypt secure channel
data (when possible)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Netlogon\Parameters /v
sealsecurechannel
Default Value:
Enabled
References:
CCE-1868-9
1.9.14 Domain member: Digitally sign secure channel data (when possible)
Description:
This control defines whether a system will try to negotiate digital signatures for all secure
channel traffic initiated by domain members. For all profiles, the recommended state for
this setting is Enabled.
Rationale:
Digitally signing secure channel data will reduce the probability of a successful man in the
middle attack.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Domain member: Digitally sign secure channel data
(when possible)
Audit:
103 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Netlogon\Parameters /v
signsecurechannel
Default Value:
Enabled
References:
CCE-2362-2
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Netlogon\Parameters /v
disablepasswordchange
Default Value:
Disabled
References:
CCE-2256-6
104 | P a g e
Rationale:
Enforcing a reasonably short password age will increase the efficacy of password-based
authentication systems by reducing the opportunity for an attacker to leverage a known
credential.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Domain member: Maximum machine account password age
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Netlogon\Parameters /v
maximumpasswordage
Default Value:
30 days
References:
CCE-2278-0
1.9.17 Domain member: Require strong (Windows 2000 or later) session key
Description:
This control defines whether secure channel communication requires a strong (128-bit)
session key. For all profiles, the recommended state for this setting is Enabled.
Rationale:
Utilizing a strong session key will reduce the probability of a success man in the middle
attack.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Domain member: Require strong (Windows 2000 or
later) session key
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Netlogon\Parameters /v
requirestrongkey
105 | P a g e
Default Value:
Disabled
References:
CCE-1802-8
For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the
recommended value is Disabled.
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is Not Defined.
Rationale:
If you enable this policy setting, jobs that are created by server operators by means of the
AT service will execute in the context of the account that runs that service. By default, that
is the local SYSTEM account. If you enable this policy setting, server operators could
perform tasks that SYSTEM is able to do but that they would typically not be able to do,
such as add their account to the local Administrators group.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Domain controller: Allow server operators to
schedule tasks
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v SubmitControl
References:
CCE-2049-5
106 | P a g e
For the SSLF Domain Controller profile(s), the recommended value is Require
signing.
For the Enterprise Member Server, Enterprise Domain Controller and SSLF
Member Server profile(s), the recommended value is Not Defined.
Rationale:
Data signing protect against man-in-the-middle attacks against data integrity. However,
requiring all LDAP clients to sign requests may prevent clients from accessing domain
resources.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Domain controller: LDAP server signing requirements
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\NTDS\Parameters /v
ldapserverintegrity
References:
CCE-2317-6
For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the
recommended value is Disabled.
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is Not Defined.
107 | P a g e
Rationale:
By disabling this policy setting on all domain controllers, domain members will be able to
periodically change their computer account passwords, which in-turn reduces their
susceptibility to attacks.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Domain controller: Refuse machine account password
changes
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Netlogon\Parameters /v
RefusePasswordChange
References:
CCE-1934-9
108 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
DontDisplayLastUserName
Default Value:
Disabled
References:
CCE-2199-8
Audit:
109 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
DisableCAD
Default Value:
Disabled
References:
CCE-2331-7
1.9.23 Interactive logon: Number of previous logons to cache (in case domain
controller is not available)
Description:
This control defines whether a user can log on to a Windows domain using cached account
information. When a workstation belongs to a domain, users can log on to it using domain
credentials. The domain credentials can be cached in the local workstations Security
Accounts Manager (SAM) database. On next logon, should no domain controller be
available, the user can still log on locally by authenticating against the cached account
information.
When logging on using cached credentials, some account properties will not be enforced,
since the domain controller maintains responsibility for enforcing account policy. The local
SAM database does not own the account, so cached account passwords do not expire, and
domain accounts cannot be locked out when the domain is unavailable.
When establishing corporate policy for cached accounts, consider the remote user. They
commonly log on with cached credentials from a laptop. To access corporate resources, the
user establishes a Virtual Private Network (VPN) connection to the corporate network.
Since logon occurs before the domain is availablethe VPN has not yet been established
the user will never be prompted to change the password on the cached account.
This setting only affects workstations joined to a domain, and only impacts interactive
logons with domain accounts. The workstation will not cache non-interactive log on
information. Change this setting to zero to disable the caching of domain accounts in the
local SAM database.
For all profiles, the recommended state for this setting is 0 logons.
Rationale:
Setting the number of cached logon to the appropriate level for the system's profile will
remove an avenue for an attacker to further compromise the environment by deriving
credentials from the cache while allows logons should the domain become unavailable.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
110 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon /v
cachedlogonscount
Default Value:
25 logons
References:
CCE-2297-0
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon /v
passwordexpirywarning
Default Value:
111 | P a g e
14 days
References:
CCE-2324-2
112 | P a g e
For all profiles, the recommended state for this setting is Enabled.
Rationale:
Enforcing this control will limit the potential for unauthorized users with account that have
been disabled from being able to unlock a computer on the network.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Interactive logon: Require Domain Controller
authentication to unlock workstation
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon /v
ForceUnlockLogon
Default Value:
Disabled
References:
CCE-2346-5
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
113 | P a g e
Default Value:
No Action
References:
CCE-1448-0
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
LegalNoticeText
References:
CCE-2225-1
114 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Interactive logon: Message title for users
attempting to log on
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
LegalNoticeCaption
References:
CCE-2037-0
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Enforcing this control to require a smart card for log on will limit the potential for
unauthorized users gaining access to computers containing sensitive data.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Interactive logon: Require smart card
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
scforceoption
Default Value:
Disabled
115 | P a g e
References:
CCE-2223-6
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\LanmanWorkstation\Parameters
/v RequireSecuritySignature
Default Value:
Disabled
References:
CCE-2356-4
1.9.31 Microsoft network client: Digitally sign communications (if server agrees)
Description:
This control defines whether the SMB client will attempt to negotiate SMB packet signing.
For all profiles, the recommended state for this setting is Enabled.
Rationale:
Digitally signing SMB communication will reduce the probability of a success man in the
middle attack between the SMB client and server.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Microsoft network client: Digitally sign
communications (if server agrees)
116 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\LanmanWorkstation\Parameters
/v EnableSecuritySignature
Default Value:
Enabled
References:
CCE-2378-8
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\LanmanWorkstation\Parameters
/v EnablePlainTextPassword
Default Value:
Disabled
References:
CCE-2272-3
117 | P a g e
1.9.33 Microsoft network server: Amount of idle time required before suspending
session
Description:
This control defines the amount of continuous idle time that must pass in an SMB session
before the session is suspended because of inactivity. For all profiles, the recommended
state for this setting is 15 minute(s).
Rationale:
Enforcing this control will limit the potential for unauthorized users from repeatedly
establishing SMB sessions until the server becomes slow or unresponsive.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Microsoft network server: Amount of idle time
required before suspending session
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\LanManServer\Parameters /v
autodisconnect
Default Value:
15 minutes
References:
CCE-2236-8
118 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\LanManServer\Parameters /v
requiresecuritysignature
Default Value:
Disabled
References:
CCE-2381-2
1.9.35 Microsoft network server: Digitally sign communications (if client agrees)
Description:
This control defines whether a server side SMB service will sign SMB packets for a client
connection. For all profiles, the recommended state for this setting is Enabled.
Rationale:
Digitally signing SMB communication will reduce the probability of a success man in the
middle attack between the SMB client and server.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Microsoft network server: Digitally sign
communications (if client agrees)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\LanManServer\Parameters /v
enablesecuritysignature
Default Value:
Disabled
References:
CCE-2263-2
1.9.36 Microsoft network server: Disconnect clients when logon hours expire
Description:
This control defines whether to disconnect a session when the user's valid logon hours
expire. For all profiles, the recommended state for this setting is Enabled.
119 | P a g e
Rationale:
Unless this setting is enabled, the benefits of imposing logon hours will not be realized.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Microsoft network server: Disconnect clients when
logon hours expire
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\LanManServer\Parameters /v
enableforcedlogoff
Default Value:
Enabled
References:
CCE-2029-7
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v RestrictAnonymousSAM
120 | P a g e
Default Value:
Enabled
References:
CCE-1962-0
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v RestrictAnonymous
Default Value:
Disabled
References:
CCE-2340-8
1.9.39 Network access: Do not allow storage of credentials or .NET Passports for
network authentication
Description:
This control defines whether the Stored User Names and Passwords feature may save
password credentials for later use when domain authentication is achieved. It is
recommended that this setting be configured as described below:
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
121 | P a g e
Note: Enabling this policy will prevent Scheduled Tasks that rely on stored credentials to
fail.
Rationale:
The confidentiality of stored credentials, and therefore the systems those credentials
access, is at risk if the system is compromised or the hard disk is insecurely discarded.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Windows 2008
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Network access: Do not allow storage of credentials
or .NET Passports for network authentication
Windows 2008 R2
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Network access: Do not allow storage of passwords
and credentials for network authentication
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v DisableDomainCreds
Default Value:
Disabled
References:
CCE-2111-3
122 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v
EveryoneIncludesAnonymous
Default Value:
Disabled
References:
CCE-1824-2
For the SSLF Member Server profile(s), the recommended value is browser.
For the SSLF Domain Controller profile(s), the recommended value is:
netlogon
lsarpc
samr
browser
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Configuring the system as recommended reduces to the system remote attack surface.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Network access: Named Pipes that can be accessed
anonymously
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
123 | P a g e
Default Value:
browser
References:
CCE-2089-1
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is:
System\CurrentControlSet\Control\ProductOptions
System\CurrentControlSet\Control\Server Applications
Software\Microsoft\Windows NT\CurrentVersion
Rationale:
Restricting the remote accessibility of registry paths reduces the remote attack surface of
the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Network access: Remotely accessible registry paths
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query
HKLM\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedExactPa
ths /v Machine
Default Value:
System\CurrentControlSet\Control\ProductOptions
System\CurrentControlSet\Control\Server Applications
Software\Microsoft\Windows NT\CurrentVersion
References:
CCE-1521-4
124 | P a g e
1.9.43 Network access: Restrict anonymous access to Named Pipes and Shares
Description:
This control defines restricts anonymous access to only those shares and pipes that are
named in the Network access. For all profiles, the recommended state for this setting is
Enabled.
Rationale:
Restricting anonymous access to named pipes and shares will ensure that only explicitly
security principals have access to these resources.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Network access: Restrict anonymous access to Named
Pipes and Shares
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\LanManServer\Parameters /v
restrictnullsessaccess
Default Value:
The registry key does not exist.
References:
CCE-2361-4
125 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\LanManServer\Parameters /v
NullSessionShares
Default Value:
None
References:
CCE-2507-2
1.9.45 Network access: Sharing and security model for local accounts
Description:
This control defines how network logons that use local accounts are authenticated. For all
profiles, the recommended state for this setting is Classic - local users authenticate
as themselves.
Rationale:
The recommended configuration allows precise control over access to resources, including
the ability to assign different types of access to different users for the same resource.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Network access: Sharing and security model for
local accounts
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v ForceGuest
Default Value:
Classic - local users authenticate as themselves
References:
CCE-2406-7
1.9.46 Network security: Do not store LAN Manager hash value on next password
change
Description:
126 | P a g e
This control defines whether the LAN Manager (LM) hash value for the new password is
stored when the password is changed. For all profiles, the recommended state for this
setting is Enabled.
Rationale:
Enabling this setting will increase the difficulty for an attacker to successfully derive
credentials by attacking the SAM file.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Network security: Do not store LAN Manager hash
value on next password change
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v NoLMHash
Default Value:
Enabled
References:
CCE-2304-4
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Send NTLMv2 response only. Refuse LM.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Send NTLMv2 response only. Refuse LM & NTLM.
Rationale:
Configuring this setting as recommended will reduce the probability of an attacker being
able to derive credentials from authentication responses.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Network security: LAN Manager authentication level
127 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa /v LmCompatibilityLevel
Default Value:
Send NTLMv2 response only
References:
CCE-2454-7
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\LDAP /v LDAPClientIntegrity
Default Value:
Negotiate signing
References:
CCE-2327-5
1.9.49 Network security: Minimum session security for NTLM SSP based
(including secure RPC) clients
Description:
This control allows a client computer to require the negotiation of message confidentiality
(encryption), message integrity, 128-bit encryption, or NTLMv2 session security. For all
128 | P a g e
profiles, the recommended state for this setting is Require NTLMv2 session
security,Require 128-bit encryption.
Rationale:
Enabling all of the options for this policy setting helps to protect network traffic that uses
the NTLM Security Support Provider (NTLM SSP) from being exposed or tampered with by
an attacker who has gained access to the same network.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Network security: Minimum session security for NTLM
SSP based (including secure RPC) clients
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Lsa\MSV1_0 /v
NTLMMinClientSec
Default Value:
No minimum
References:
CCE-1767-3
Audit:
129 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Setup\RecoveryConsole /v securitylevel
Default Value:
Disabled
References:
CCE-2309-3
1.9.51 Recovery console: Allow floppy copy and access to all drives and all folders
Description:
This control defines whether the Recovery Console SET command is available. It is
recommended that this setting be configured as described below:
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Disabled.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Disabling this setting will prevent an attacker who can cause the system to restart into the
Recovery Console from stealing sensitive data with no audit or access trail.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\Recovery console: Allow floppy copy and access to
all drives and all folders
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Setup\RecoveryConsole /v setcommand
Default Value:
Disabled
References:
CCE-1553-7
130 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Session Manager\Memory
Management /v ClearPageFileAtShutdown
Default Value:
Disabled
References:
CCE-2416-6
Audit:
131 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
ShutdownWithoutLogon
Default Value:
Disabled
References:
CCE-2403-4
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Session Manager\Kernel /v
ObCaseInsensitive
Default Value:
Not Configured
References:
CCE-2429-9
132 | P a g e
This control defines the strength of the default discretionary access control list (DACL) to
help secure shared objects on the system. For all profiles, the recommended state for this
setting is Enabled.
Rationale:
With this setting enabled, non-administrative users will not be able to modify shared
objects that they did not create.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\System objects: Strengthen default permissions of
internal system objects (e.g. Symbolic Links)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Session Manager /v
ProtectionMode
Default Value:
Enabled
References:
CCE-2451-3
1.9.56 System cryptography: Force strong key protection for user keys stored on
the computer
Description:
This control defines whether a user's private key requires a password to be used. It is
recommended that this setting be configured as described below:
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is User must enter a password each time they use a
key.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is User is prompted when the key is first used.
Rationale:
Requiring a password to decrypt stored keys will reduce the probability of an attacker
gaining access to those keys even if the attacker takes control of the user's computer.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
133 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Cryptography /v ForceKeyProtection
Default Value:
Not Configured
References:
CCE-2319-2
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\Session Manager\SubSystems /v
optional
Default Value:
Posix
References:
CCE-1598-2
134 | P a g e
This control defines whether digital certificates are processed when software restriction
policies are enabled and a user or process attempts to run software with an .exe file name
extension. It is recommended that this setting be configured as described below:
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Enabling this setting configures restriction policies help to protect users and computers
because they can prevent the execution of unauthorized code, such as viruses and Trojans
horses.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\System settings: Use Certificate Rules on Windows
Executables for Software Restriction Policies
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers /v
AuthenticodeEnabled
Default Value:
Disabled
References:
CCE-2421-6
135 | P a g e
Note: MSS:-prefixed settings may not be visible in the Group Policy Management Editor.
To reveal these setting, please download the Administrative Templates from the CIS web
site. Alternatively, please download Microsoft Security Compliance Manager, run
LocalGPO.msi, then execute the following command:
cscript LocalGPO.wsf /ConfigureSCE
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon /v
AutoAdminLogon
Default Value:
The registry key does not exist.
References:
CCE-2307-7
Audit:
136 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Tcpip\Parameters /v
DisableIPSourceRouting
Default Value:
The registry key does not exist.
References:
CCE-1826-7
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Tcpip\Parameters /v
EnableICMPRedirect
Default Value:
Enabled
References:
CCE-1470-4
137 | P a g e
This control defines every how many milliseconds TCP attempts to send a keep-alive
packet to verify that an idle connection is still intact. It is recommended that this setting be
configured as described below:
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is 5 minutes .
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Reducing the keep alive timeout will limit the potential for malicious users to establish
multiple connections to cause a denial of service (DoS) attack on the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\MSS: (KeepAliveTime) How often keep-alive packets
are sent in milliseconds
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Tcpip\Parameters /v
KeepAliveTime
Default Value:
The registry key does not exist.
References:
CCE-2399-4
138 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\IPSEC\NoDefaultExempt /v
NoDefaultExempt
Default Value:
The registry key does not exist.
References:
CCE-2404-2
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Netbt\Parameters /v
NoNameReleaseOnDemand
Default Value:
Enabled
139 | P a g e
References:
CCE-2320-0
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Control\FileSystem /v
NtfsDisable8dot3NameCreation
Default Value:
Disabled
References:
CCE-2156-8
140 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\MSS: (PerformRouterDiscovery) Allow IRDP to detect
and configure Default Gateway addresses (could lead to DoS)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Tcpip\Parameters /v
PerformRouterDiscovery
Default Value:
Enable only if DHCP sends the Perform Router Discovery option
References:
CCE-1800-2
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SYSTEM\CurrentControlSet\Control\Session Manager /v
SafeDllSearchMode
Default Value:
The registry key does not exist.
141 | P a g e
References:
CCE-2447-1
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon /v
ScreenSaverGracePeriod
Default Value:
5 seconds
References:
CCE-2183-2
142 | P a g e
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\MSS: (TCPMaxDataRetransmissions) How many times
unacknowledged data is retransmitted (3 recommended, 5 is default)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Tcpip\Parameters /v
TcpMaxDataRetransmissions
Default Value:
5
References:
CCE-2424-0
1.9.70 MSS: (WarningLevel) Percentage threshold for the security event log at
which the system will generate a warning
Description:
This control defines whether an entry is added to the Security event log when the log
reaches a user-defined threshold. For all profiles, the recommended state for this setting is
90% or less.
Rationale:
If the Security log reaches 90 percent of its capacity and the computer has not been
configured to overwrite events as needed, new events will not be written to the log.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\MSS: (WarningLevel) Percentage threshold for the
security event log at which the system will generate a warning
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Security /v
WarningLevel
Default Value:
143 | P a g e
References:
CCE-2442-2
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Tcpip6\Parameters /v
DisableIPSourceRouting
References:
CCE-5229-0
144 | P a g e
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\MSS: (TCPMaxDataRetransmissions) IPv6 How many
times unacknowledged data is retransmitted (3 recommended, 5 is default)
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\System\CurrentControlSet\Services\Tcpip6\Parameters /v
TcpMaxDataRetransmissions
Default Value:
5
References:
CCE-5263-9
Audit:
145 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services /v
fPromptForPassword
Default Value:
Not Configured
References:
CCE-7636-4
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services /v
MinEncryptionLevel
Default Value:
Not Configured
References:
CCE-7667-9
146 | P a g e
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Configured.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled.
Rationale:
Redirecting a local drive to a remote Terminal Services session may expose local drive
contents to threats against its confidentiality, integrity, and availability.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\Windows Components\Remote
Desktop Services\Remote Desktop Session Host\Device and Resource
Redirection\Do not allow drive redirection
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services /v
fDisableCdm
Default Value:
Not Configured
Audit:
147 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services /v
DisablePasswordSaving
Default Value:
Not Configured
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows NT\Printers /v
DisableWebPnPDownload
1.11.2 Turn off the "Publish to Web" task for files and folders
Description:
This control defines whether to make the tasks for publishing files, folders and selected
items to web available from File and Folder Tasks in Window folders. For all profiles, the
recommended state for this setting is Enabled.
Rationale:
Disabling Publish to Web capabilities will reduce the probability of a user publishing
confidential or sensitive information to a public service.
Remediation:
148 | P a g e
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Internet Communication
Management\Internet Communication settings\Turn off the "Publish to Web" task
for files and folders
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v
NoPublishingWizard
1.11.3 Turn off Internet download for Web publishing and online ordering
wizards
Description:
This control defines whether Windows will download a list of providers for the Web
publishing and online ordering wizards. For all profiles, the recommended state for this
setting is Enabled.
Rationale:
Enabling this control will reduce the possibility of a user unknowingly downloading
malicious content.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Internet Communication
Management\Internet Communication settings\Turn off Internet download for Web
publishing and online ordering wizards
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v
NoWebServices
149 | P a g e
Rationale:
HTTP is a clear text protocol that provides not confidentiality or integrity guarantees. Given
this, the confidentiality and integrity of print data is at risk when printing over HTTP.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Internet Communication
Management\Internet Communication settings\Turn off printing over HTTP
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows NT\Printers /v
DisableHTTPPrinting
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\SearchCompanion /v
DisableContentFileUpdates
150 | P a g e
This control defines whether Windows Messenger will collect and send anonymous
information on Windows Messenger usage. For all profiles, the recommended state for this
setting is Enabled.
Rationale:
This feature provides no functional capability to the system. Therefore, it is recommended
that this capability be disabled to eliminate any risk of information disclosure.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Internet Communication
Management\Internet Communication settings\Turn off the Windows Messenger
Customer Experience Improvement Program
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Messenger\Client /v CEIP
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Enabling this setting prevents users from downloading and installing device drivers that
reduces system stability and security.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Internet Communication
Management\Internet Communication settings\Turn off Windows Update device
driver searching
Audit:
151 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\DriverSearching /v
DontSearchWindowsUpdate
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Configured.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled.
Rationale:
The capabilities provided by this list may be leveraged by a malicious user or software to
cause Windows to execute arbitrary code upon reboot.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Logon\Do not process
the legacy run list
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v
DisableLocalMachineRun
Default Value:
Not Configured
152 | P a g e
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Configured.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled.
Rationale:
The capabilities provided by this list may be leveraged by a malicious user or software to
cause Windows to execute arbitrary code upon reboot.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Logon\Do not process
the run once list
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v
DisableLocalMachineRunOnce
Default Value:
Not Configured
For the Enterprise Member Server and SSLF Member Server profile(s), the
recommended value is Enabled (Process even if the Group Policy objects
have not changed).
For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the
recommended value is Not Defined.
Rationale:
Updating and reapplying all policies to the system will ensure that any changes to policy
made by the local user have are reset as defined in Group Policy.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Group Policy\Registry
policy processing
153 | P a g e
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows\Group Policy\{35378EAC683F-11D2-A89A-00C04FBBCFA2} /v NoGPOListChanges,NoBackgroundPolicy
Default Value:
Not Configured
References:
CCE-8492-1
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Disabled.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Allowing a remote system to view or control the local system effectively extends the local
system's trust boundary to include the remote system. As such, the security status of the
remote system may impact the security status of the local system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Remote
Assistance\Offer Remote Assistance
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\policies\Microsoft\Windows NT\Terminal Services /v
fAllowUnsolicited
Default Value:
Not Configured
References:
154 | P a g e
CCE-7643-0
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Disabled.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Allowing a remote system to view or control the local system effectively extends the local
system's trust boundary to include the remote system. As such, the security status of the
remote system may impact the security status of the local system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Remote
Assistance\Solicited Remote Assistance
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\policies\Microsoft\Windows NT\Terminal Services /v
fAllowToGetHelp
Default Value:
Not Configured
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled:Authenticated.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
155 | P a g e
Requiring the RPC client to authenticate prior to communicating with an RPC server will
reduce the remote unauthenticated attack surface of the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Remote Procedure
Call\Restrictions for Unauthenticated RPC clients
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows NT\Rpc /v
RestrictRemoteClients
Default Value:
Not Configured
References:
CCE-7658-8
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Enabled.
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Defined.
Rationale:
Requiring the RPC client to authenticate prior to communicating with the Endpoint Mapper
Service will reduce the remote unauthenticated attack surface of the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\System\Remote Procedure
Call\RPC Endpoint Mapper Client Authentication
Audit:
156 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Windows NT\Rpc /v
EnableAuthEpResolution
Default Value:
Not Configured
References:
CCE-8572-0
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v
NoDriveTypeAutoRun
Default Value:
Not Configured
References:
CCE-8634-8
157 | P a g e
For the Enterprise Member Server and Enterprise Domain Controller profile(s),
the recommended value is Not Configured.
For the SSLF Member Server and SSLF Domain Controller profile(s), the
recommended value is Disabled.
Rationale:
Displaying a list of administrator accounts on the system may inadvertently disclose the
names of power accounts.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\Windows Components\Credential
User Interface\Enumerate administrator accounts on elevation
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\CredUI /v
EnumerateAdministrators
Default Value:
Not Configured
References:
CCE-8568-8
1.12.10
Description:
When this setting is enabled, instead of displaying the credentials dialog, Windows will first
prompt the user to press Control+Alt+Delete, then Windows will switch to the secure
desktop to accept the users credentials. For all profiles, the recommended state for this
setting is Enabled.
Rationale:
Requiring the use of a trusted path helps reduce the probability of an administrator being
tricked into divulging credentials to malicious software that is masquerading as the
credential dialog.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\Windows Components\Credential
User Interface\Require trusted path for credential entry
Audit:
158 | P a g e
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\CredUI /v
EnableSecureCredentialPrompting
Default Value:
Not Configured
1.12.11
Description:
This control defines whether a user is allowed to share their desktop using NetMeeting. For
all profiles, the recommended state for this setting is Enabled.
Rationale:
Preventing remote Desktop Sharing will reduce the remote attack surface of the system.
Remediation:
To establish the recommended configuration via GPO, set the following to the value
prescribed above:
Computer Configuration\Administrative Templates\Windows
Components\NetMeeting\Disable remote Desktop Sharing
Audit:
Navigate to the GPO articulated in the Remediation section and confirm it is set as
prescribed. Alternatively, execute the following to determine if the system is configured as
recommended:
reg query HKLM\Software\Policies\Microsoft\Conferencing /v NoRDS
Default Value:
Not Configured
References:
CCE-8178-6
159 | P a g e
Appendix A: References
1. Microsoft, Inc. (2009). Windows Server 2008 Security Guide. Available:
http://www.microsoft.com/downloads/details.aspx?familyid=FB8B981F-227C-4AF6A44B-B115696A80AC&displaylang=en. Last accessed 4 February 2010.
2. Microsoft, Inc. (2009). Security Compliance Management Toolkit Series. Available:
http://www.microsoft.com/downloads/details.aspx?FamilyID=5534bee1-3cad-4bf0b92b-a8e545573a3e&displaylang=en. Last accessed 4 February 2010.
3. Defense Information Systems Agency. (2009). Windows Server 2008 Security Checklist.
Available: http://web.nvd.nist.gov/view/ncp/repository/checklistDetail?id=228. Last
accessed 4 February 2010.
4. Center for Internet Security. (2007). CIS Windows 2003 Server Domain Controller
Benchmark v.2.0.0. Available: http://cisecurity.org/enus/?route=permalink.7a30501f056fd924e42a40473a3e9ee8. Last accessed 4 February
2010.
5. Center for Internet Security. (2007). CIS Windows 2003 Server Member Server
Benchmark v.2.0.0. Available: http://cisecurity.org/enus/?route=permalink.e5e9b1c5408964e0d438ac41cccc58f2. Last accessed 4 February
2010.
160 | P a g e
161 | P a g e