BSI-100-2 Windows 2005

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: BSI-100-2 Windows 2005

Updated: 4/2/2021

Authority: BSI

Plugin: Windows

Revision: 1.9

Estimated Item Count: 132

Audit Items

DescriptionCategories
BSI-100-2: S 2.327: Secure remote access under Windows XP, Windows Vista and Windows 7: Automatically log off users when logon time expires

ACCESS CONTROL

BSI-100-2: S 2.327: Secure remote access under Windows XP, Windows Vista and Windows 7: Remote Assistance (Get Help)

ACCESS CONTROL

BSI-100-2: S 2.327: Secure remote access under Windows XP, Windows Vista and Windows 7: Remote Assistance (Unsolicited)

ACCESS CONTROL

BSI-100-2: S 4.2: Screen lock: Automatic screen lock after a period of no user inputs

ACCESS CONTROL

BSI-100-2: S 4.3: Use of virus protection programs: Periodic runs of a virus protection program

SYSTEM AND INFORMATION INTEGRITY

BSI-100-2: S 4.4: Correct handling of drives for removable media and external data storage: Allow to eject removable NTFS media

MEDIA PROTECTION

BSI-100-2: S 4.15: Secure log-in: Message for users wanting to log on (Undefined)

ACCESS CONTROL

BSI-100-2: S 4.15: Secure log-in: Message title for users wanting to log on (Undefined)

ACCESS CONTROL

BSI-100-2: S 4.29: Use of an encryption product for portable IT systems

SYSTEM AND COMMUNICATIONS PROTECTION

BSI-100-2: S 4.31: Ensuring power supply during mobile use

ACCESS CONTROL

BSI-100-2: S 4.48: Password protection under Windows systems: Account lockout duration = 60

ACCESS CONTROL

BSI-100-2: S 4.48: Password protection under Windows systems: Account lockout threshold = 3

ACCESS CONTROL

BSI-100-2: S 4.48: Password protection under Windows systems: Automatic login

ACCESS CONTROL

BSI-100-2: S 4.48: Password protection under Windows systems: Disable reversible encryption for stored passwords

IDENTIFICATION AND AUTHENTICATION

BSI-100-2: S 4.48: Password protection under Windows systems: Maximum Password Age = 90 days

IDENTIFICATION AND AUTHENTICATION

BSI-100-2: S 4.48: Password protection under Windows systems: Minimum Password Age = 1 day

IDENTIFICATION AND AUTHENTICATION

BSI-100-2: S 4.48: Password protection under Windows systems: Minimum password length = 8 characters

IDENTIFICATION AND AUTHENTICATION

BSI-100-2: S 4.48: Password protection under Windows systems: Password History >= 6

IDENTIFICATION AND AUTHENTICATION

BSI-100-2: S 4.48: Password protection under Windows systems: Passwords must meet complexity requirements

IDENTIFICATION AND AUTHENTICATION

BSI-100-2: S 4.48: Password protection under Windows systems: Reset account lockout = 30 minutes

ACCESS CONTROL

BSI-100-2: S 4.57: Disabling automatic CD-ROM recognition

SYSTEM AND COMMUNICATIONS PROTECTION

BSI-100-2: S 4.79: Secure access mechanisms for local administration: Automatic admin account recovery console logon (Disabled)

ACCESS CONTROL

BSI-100-2: S 4.81: Auditing and logging of activities in a network: Remote assistance (Enabled)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.101: Firewalls and encryption: Data should always be encrypted before it is sent if at all possible

SYSTEM AND COMMUNICATIONS PROTECTION

BSI-100-2: S 4.200: Handling of USB storage media: It is possible to prevent the device driver for USB storage media from starting up

CONFIGURATION MANAGEMENT

BSI-100-2: S 4.200: Handling of USB storage media: USB storage media need to be handled in exactly the same way as conventional media

MEDIA PROTECTION

BSI-100-2: S 4.237: Secure basic configuration of IT systems: Access this computer from the network

ACCESS CONTROL

BSI-100-2: S 4.244: Secure configuration of Windows client operating systems: Application-specific policies - Messenger

CONFIGURATION MANAGEMENT

BSI-100-2: S 4.244: Secure configuration of Windows client operating systems: Application-specific policies - Telnet Client

CONFIGURATION MANAGEMENT

BSI-100-2: S 4.244: Secure configuration of Windows client operating systems: Application-specific policies - UPNP

CONFIGURATION MANAGEMENT

BSI-100-2: S 4.244: Secure configuration of Windows client operating systems: Application-specific policies - Wireless Zero Config

CONFIGURATION MANAGEMENT

BSI-100-2: S 4.244: Secure configuration of Windows client operating systems: Disable CTRL+ALT+DEL request on login (Disabled)

CONFIGURATION MANAGEMENT

BSI-100-2: S 4.244: Secure configuration of Windows client operating systems: Do not show last user name in login dialog (Enabled)

CONFIGURATION MANAGEMENT

BSI-100-2: S 4.249: Use of virus protection programs: Keeping Windows client systems up to date: Updating methods

SYSTEM AND INFORMATION INTEGRITY

BSI-100-2: S 4.284: Handling of services under Windows Server 2003 and higher: Logon as a service (Undefined)

ACCESS CONTROL

BSI-100-2: S 4.305: Use of storage restrictions (storage quotas): Increase quotas (Administrators)

ACCESS CONTROL

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit account logon events (Success, Failure)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit account management (Success, Failure)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit logon events (Success, Failure)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit object access (Failure)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit policy change (Success, Failure)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit privilege use (Failure)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit process tracking (No auditing)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit system events (Success, Failure)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Maximum size of application log

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Maximum size of security log

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Maximum size of system log

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Retain application log for (Undefined)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Retain security log for (Undefined)

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Shut down system when max. security log size

AUDIT AND ACCOUNTABILITY