CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.2.0

Audit Details

Name: CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.2.0

Updated: 7/21/2022

Authority: CIS

Plugin: Windows

Revision: 1.7

Estimated Item Count: 318

File Details

Filename: CIS_MS_Windows_Server_2008_R2_DC_Level_1_v3.2.0.audit

Size: 829 kB

MD5: 4c7b3e6c8769bfb71a45dfa734bfbe1a
SHA256: 7016216aa4de0cd57e0a38105d613dda45730a1f743f4ab32e7424a7f933d42c

Audit Items

DescriptionCategories
1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.1.4 Ensure 'Minimum password length' is set to '14 or more character(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.5 Ensure 'Password must meet complexity requirements' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

1.1.6 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'

IDENTIFICATION AND AUTHENTICATION

1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.2.2 Ensure 'Account lockout threshold' is set to '10 or fewer invalid logon attempt(s), but not 0'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.2.3 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'

IDENTIFICATION AND AUTHENTICATION

2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.2 Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users, ENTERPRISE DOMAIN CONTROLLERS' (DC only)

SYSTEM AND INFORMATION INTEGRITY

2.2.4 Ensure 'Act as part of the operating system' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.5 Ensure 'Add workstations to domain' is set to 'Administrators' (DC only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

2.2.6 Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

2.2.7 Ensure 'Allow log on locally' is set to 'Administrators'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.2.8 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.11 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.12 Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.13 Ensure 'Create a pagefile' is set to 'Administrators'

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.14 Ensure 'Create a token object' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.16 Ensure 'Create permanent shared objects' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.17 Ensure 'Create symbolic links' is set to 'Administrators' (DC only)

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.19 Ensure 'Debug programs' is set to 'Administrators'

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.20 Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only)

ACCESS CONTROL

2.2.22 Ensure 'Deny log on as a batch job' to include 'Guests'

ACCESS CONTROL

2.2.23 Ensure 'Deny log on as a service' to include 'Guests'

ACCESS CONTROL

2.2.24 Ensure 'Deny log on locally' to include 'Guests'

ACCESS CONTROL

2.2.25 Ensure 'Deny log on through Remote Desktop Services' to include 'Guests' (DC only)

ACCESS CONTROL

2.2.27 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'Administrators' (DC only)

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.29 Ensure 'Force shutdown from a remote system' is set to 'Administrators'

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.30 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'

IDENTIFICATION AND AUTHENTICATION

2.2.31 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only)

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.33 Ensure 'Increase scheduling priority' is set to 'Administrators'

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.34 Ensure 'Load and unload device drivers' is set to 'Administrators'

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.35 Ensure 'Lock pages in memory' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.37 Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.39 Ensure 'Modify an object label' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.40 Ensure 'Modify firmware environment values' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.41 Ensure 'Perform volume maintenance tasks' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.42 Ensure 'Profile single process' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.43 Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.44 Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'

IDENTIFICATION AND AUTHENTICATION

2.2.45 Ensure 'Restore files and directories' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.46 Ensure 'Shut down the system' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.47 Ensure 'Synchronize directory service data' is set to 'No One' (DC only)

AUDIT AND ACCOUNTABILITY

2.2.48 Ensure 'Take ownership of files or other objects' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.1.3 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

2.3.1.4 Configure 'Accounts: Rename administrator account'

ACCESS CONTROL