CIS Microsoft Windows 10 Stand-alone v4.0.0 BL

Audit Details

Name: CIS Microsoft Windows 10 Stand-alone v4.0.0 BL

Updated: 7/30/2025

Authority: CIS

Plugin: Windows

Revision: 1.0

Estimated Item Count: 45

File Details

Filename: CIS_Microsoft_Windows_10_Stand-alone_v4.0.0_BL.audit

Size: 131 kB

MD5: eb4f3e2792aadfe9fcfceef49d0afeac
SHA256: 99a8f1e95947cd35603839c367d0ffaef45dc140d97233623ca4235aec3760b0

Audit Items

DescriptionCategories
2.3.7.3 (BL) Ensure 'Interactive logon: Machine account lockout threshold' is set to '10 or fewer invalid logon attempts, but not 0'

ACCESS CONTROL

18.9.7.1.1 (BL) Ensure 'Prevent installation of devices that match any of these device IDs' is set to 'Enabled'

MEDIA PROTECTION

18.9.7.1.2 (BL) Ensure 'Prevent installation of devices that match any of these device IDs: Prevent installation of devices that match any of these device IDs' is set to 'PCI\CC_0C0A'

MEDIA PROTECTION

18.9.7.1.3 (BL) Ensure 'Prevent installation of devices that match any of these device IDs: Also apply to matching devices that are already installed.' is set to 'True' (checked)

MEDIA PROTECTION

18.9.7.1.4 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes' is set to 'Enabled'

MEDIA PROTECTION

18.9.7.1.5 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.6 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)

SYSTEM AND INFORMATION INTEGRITY

18.9.24.1 (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All'

CONFIGURATION MANAGEMENT

18.9.33.6.3 (BL) Ensure 'Allow standby states (S1-S3) when sleeping (on battery)' is set to 'Disabled'

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

18.9.33.6.4 (BL) Ensure 'Allow standby states (S1-S3) when sleeping (plugged in)' is set to 'Disabled'

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

18.10.10.1.1 (BL) Ensure 'Allow access to BitLocker-protected fixed data drives from earlier versions of Windows' is set to 'Disabled'

ACCESS CONTROL

18.10.10.1.2 (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered' is set to 'Enabled'

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.1.3 (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Allow data recovery agent' is set to 'Enabled: True'

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.1.4 (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Recovery Password' is set to 'Enabled: Allow 48-digit recovery password' or higher

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.1.5 (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Recovery Key' is set to 'Enabled: Allow 256-bit recovery key' or higher

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.1.6 (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Omit recovery options from the BitLocker setup wizard' is set to 'Enabled: True'

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.1.7 (BL) Ensure 'Configure use of hardware-based encryption for fixed data drives' is set to 'Disabled'

ACCESS CONTROL

18.10.10.1.8 (BL) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled'

IDENTIFICATION AND AUTHENTICATION

18.10.10.1.9 (BL) Ensure 'Configure use of smart cards on fixed data drives' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.1.10 (BL) Ensure 'Configure use of smart cards on fixed data drives: Require use of smart cards on fixed data drives' is set to 'Enabled: True'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.2.1 (BL) Ensure 'Allow enhanced PINs for startup' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

18.10.10.2.2 (BL) Ensure 'Allow Secure Boot for integrity validation' is set to 'Enabled'

SYSTEM AND INFORMATION INTEGRITY

18.10.10.2.3 (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered' is set to 'Enabled'

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.2.4 (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Allow data recovery agent' is set to 'Enabled: False'

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.2.5 (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Recovery Password' is set to 'Enabled: Require 48-digit recovery password'

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.2.6 (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Recovery Key' is set to 'Enabled: Do not allow 256-bit recovery key'

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.2.7 (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Omit recovery options from the BitLocker setup wizard' is set to 'Enabled: True'

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.2.8 (BL) Ensure 'Configure use of hardware-based encryption for operating system drives' is set to 'Disabled'

ACCESS CONTROL

18.10.10.2.9 (BL) Ensure 'Configure use of passwords for operating system drives' is set to 'Disabled'

IDENTIFICATION AND AUTHENTICATION

18.10.10.2.10 (BL) Ensure 'Require additional authentication at startup' is set to 'Enabled'

ACCESS CONTROL

18.10.10.2.11 (BL) Ensure 'Require additional authentication at startup: Allow BitLocker without a compatible TPM' is set to 'Enabled: False'

ACCESS CONTROL

18.10.10.3.1 (BL) Ensure 'Allow access to BitLocker-protected removable data drives from earlier versions of Windows' is set to 'Disabled'

ACCESS CONTROL

18.10.10.3.2 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered' is set to 'Enabled'

MEDIA PROTECTION

18.10.10.3.3 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Allow data recovery agent' is set to 'Enabled: True'

MEDIA PROTECTION

18.10.10.3.4 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Recovery Password' is set to 'Enabled: Do not allow 48-digit recovery password'

MEDIA PROTECTION

18.10.10.3.5 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Recovery Key' is set to 'Enabled: Do not allow 256-bit recovery key'

MEDIA PROTECTION

18.10.10.3.6 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Omit recovery options from the BitLocker setup wizard' is set to 'Enabled: True'

MEDIA PROTECTION

18.10.10.3.7 (BL) Ensure 'Configure use of hardware-based encryption for removable data drives' is set to 'Disabled'

ACCESS CONTROL

18.10.10.3.8 (BL) Ensure 'Configure use of passwords for removable data drives' is set to 'Disabled'

IDENTIFICATION AND AUTHENTICATION

18.10.10.3.9 (BL) Ensure 'Configure use of smart cards on removable data drives' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.3.10 (BL) Ensure 'Configure use of smart cards on removable data drives: Require use of smart cards on removable data drives' is set to 'Enabled: True'

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.3.11 (BL) Ensure 'Deny write access to removable drives not protected by BitLocker' is set to 'Enabled'

MEDIA PROTECTION

18.10.10.3.12 (BL) Ensure 'Deny write access to removable drives not protected by BitLocker: Do not allow write access to devices configured in another organization' is set to 'Enabled: False'

MEDIA PROTECTION

18.10.10.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled'

SYSTEM AND INFORMATION INTEGRITY

CIS_Microsoft_Windows_10_Stand-alone_v4.0.0_BL.audit from CIS Microsoft Windows 10 Stand-alone Benchmark v4.0.0