CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0

Audit Details

Name: CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0

Updated: 1/4/2023

Authority: CIS

Plugin: Windows

Revision: 1.2

Estimated Item Count: 311

File Details

Filename: CIS_MS_Windows_Server_2008_v3.3.0_DC_L1.audit

Size: 800 kB

MD5: bf77b9d6d20b952683b3bab3021b88a8
SHA256: 89ae8b86d9905804bd50797aaa9577a58738283447574a33bee6e028fb8a3534

Audit Items

DescriptionCategories
1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.2 Ensure 'Maximum password age' is set to '365 or fewer days, but not 0'

IDENTIFICATION AND AUTHENTICATION

1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.4 Ensure 'Minimum password length' is set to '14 or more character(s)'

IDENTIFICATION AND AUTHENTICATION

1.1.5 Ensure 'Password must meet complexity requirements' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

1.1.6 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'

ACCESS CONTROL

1.2.2 Ensure 'Account lockout threshold' is set to '5 or fewer invalid logon attempt(s), but not 0'

ACCESS CONTROL

1.2.3 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'

ACCESS CONTROL

2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.2 Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users, ENTERPRISE DOMAIN CONTROLLERS' (DC only)

SYSTEM AND INFORMATION INTEGRITY

2.2.4 Ensure 'Act as part of the operating system' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.5 Ensure 'Add workstations to domain' is set to 'Administrators' (DC only)

ACCESS CONTROL

2.2.6 Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

2.2.7 Ensure 'Allow log on locally' is set to 'Administrators'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.2.8 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only)

ACCESS CONTROL

2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.11 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.12 Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.13 Ensure 'Create a pagefile' is set to 'Administrators'

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.14 Ensure 'Create a token object' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.16 Ensure 'Create permanent shared objects' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.17 Ensure 'Create symbolic links' is set to 'Administrators' (DC only)

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.18 Ensure 'Debug programs' is set to 'Administrators'

SYSTEM AND INFORMATION INTEGRITY

2.2.19 Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only)

ACCESS CONTROL

2.2.21 Ensure 'Deny log on as a batch job' to include 'Guests'

ACCESS CONTROL

2.2.22 Ensure 'Deny log on as a service' to include 'Guests'

ACCESS CONTROL

2.2.23 Ensure 'Deny log on locally' to include 'Guests'

ACCESS CONTROL

2.2.24 Ensure 'Deny log on through Remote Desktop Services' to include 'Guests' (DC only)

ACCESS CONTROL

2.2.26 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'Administrators' (DC only)

ACCESS CONTROL

2.2.28 Ensure 'Force shutdown from a remote system' is set to 'Administrators'

ACCESS CONTROL

2.2.29 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'

AUDIT AND ACCOUNTABILITY

2.2.30 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only)

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.32 Ensure 'Load and unload device drivers' is set to 'Administrators'

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.33 Ensure 'Lock pages in memory' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.35 Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.37 Ensure 'Modify an object label' is set to 'No One'

AUDIT AND ACCOUNTABILITY

2.2.38 Ensure 'Modify firmware environment values' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.39 Ensure 'Perform volume maintenance tasks' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.40 Ensure 'Profile single process' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.41 Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'

IDENTIFICATION AND AUTHENTICATION

2.2.42 Ensure 'Restore files and directories' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.43 Ensure 'Shut down the system' is set to 'Administrators'

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.44 Ensure 'Synchronize directory service data' is set to 'No One' (DC only)

AUDIT AND ACCOUNTABILITY

2.2.45 Ensure 'Take ownership of files or other objects' is set to 'Administrators'

ACCESS CONTROL

2.3.1.3 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

2.3.1.4 Configure 'Accounts: Rename administrator account'

IDENTIFICATION AND AUTHENTICATION

2.3.1.5 Configure 'Accounts: Rename guest account'

IDENTIFICATION AND AUTHENTICATION

2.3.2.1 Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'

AUDIT AND ACCOUNTABILITY