CIS Windows Server 2012 MS L1 v2.2.0

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Windows Server 2012 MS L1 v2.2.0

Updated: 12/21/2022

Authority: Operating Systems and Applications

Plugin: Windows

Revision: 1.10

Estimated Item Count: 323

Audit Items

DescriptionCategories
1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'
1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'
1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)'
1.1.4 Ensure 'Minimum password length' is set to '14 or more character(s)'
1.1.5 Ensure 'Password must meet complexity requirements' is set to 'Enabled'
1.1.6 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'
1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'
1.2.2 Ensure 'Account lockout threshold' is set to '10 or fewer invalid logon attempt(s), but not 0'
1.2.3 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'
2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'
2.2.3 Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only)
2.2.4 Ensure 'Act as part of the operating system' is set to 'No One'
2.2.6 Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'
2.2.7 Ensure 'Allow log on locally' is set to 'Administrators'
2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only)
2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'
2.2.11 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'
2.2.12 Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE'
2.2.13 Ensure 'Create a pagefile' is set to 'Administrators'
2.2.14 Ensure 'Create a token object' is set to 'No One'
2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'
2.2.16 Ensure 'Create permanent shared objects' is set to 'No One'
2.2.18 Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines' (MS only)
2.2.19 Ensure 'Debug programs' is set to 'Administrators'
2.2.21 Ensure 'Deny access to this computer from the network' to include 'Guests, Local account and member of Administrators group' (MS only)
2.2.22 Ensure 'Deny log on as a batch job' to include 'Guests'
2.2.23 Ensure 'Deny log on as a service' to include 'Guests'
2.2.24 Ensure 'Deny log on locally' to include 'Guests'
2.2.26 Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account' (MS only)
2.2.28 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only)
2.2.29 Ensure 'Force shutdown from a remote system' is set to 'Administrators'
2.2.30 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'
2.2.32 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' and (when the Web Server (IIS) Role with Web Services Role Service is installed) 'IIS_IUSRS' (MS only)
2.2.33 Ensure 'Increase scheduling priority' is set to 'Administrators'
2.2.34 Ensure 'Load and unload device drivers' is set to 'Administrators'
2.2.35 Ensure 'Lock pages in memory' is set to 'No One'
2.2.38 Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only)
2.2.39 Ensure 'Modify an object label' is set to 'No One'
2.2.40 Ensure 'Modify firmware environment values' is set to 'Administrators'
2.2.41 Ensure 'Perform volume maintenance tasks' is set to 'Administrators'
2.2.42 Ensure 'Profile single process' is set to 'Administrators'
2.2.43 Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost'
2.2.44 Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'
2.2.45 Ensure 'Restore files and directories' is set to 'Administrators'
2.2.46 Ensure 'Shut down the system' is set to 'Administrators'
2.2.48 Ensure 'Take ownership of files or other objects' is set to 'Administrators'
2.3.1.1 Ensure 'Accounts: Administrator account status' is set to 'Disabled' (MS only)
2.3.1.2 Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'
2.3.1.3 Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only)
2.3.1.4 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'