CIS Microsoft Windows Server 2016 STIG MS STIG v1.1.0

Audit Details

Name: CIS Microsoft Windows Server 2016 STIG MS STIG v1.1.0

Updated: 9/15/2023

Authority: CIS

Plugin: Windows

Revision: 1.11

Estimated Item Count: 249

File Details

Filename: CIS_Microsoft_Windows_Server_2016_STIG_v1.1.0_STIG_MS.audit

Size: 832 kB

MD5: 99406a716bea43b2d1851a3b6c0d9b4f
SHA256: d6df4767c68bc9ce419e47751107f751a985a435d6fe963ac70d875dcd1d8262

Audit Items

DescriptionCategories
1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'

ACCESS CONTROL

1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'

ACCESS CONTROL

1.1.4 Ensure 'Minimum password age' is set to '1 or more day(s)'

ACCESS CONTROL

1.1.5 Ensure 'Minimum password length' is set to '14 or more character(s)'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.1.6 Ensure 'Password must meet complexity requirements' is set to 'Enabled'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.1.7 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'

ACCESS CONTROL

1.2.2 Ensure 'Account lockout threshold' is set to '3 or fewer invalid logon attempt(s), but not 0'

ACCESS CONTROL

1.2.4 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'

ACCESS CONTROL

2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.3 Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only) - Administrators, Authenticated Users

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.4 Ensure 'Act as part of the operating system' is set to 'No One'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.7 Ensure 'Allow log on locally' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.13 Ensure 'Create a pagefile' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.14 Ensure 'Create a token object' is set to 'No One'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.16 Ensure 'Create permanent shared objects' is set to 'No One'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.19 Ensure 'Create symbolic links' is set to 'Administrators' (STIG MS and DC only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.20 Ensure 'Debug programs' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.23 Ensure 'Deny access to this computer from the network' to include 'Guests, member of Administrators group, Enterprise Admins Group, and Domain Admins Group' (STIG MS only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.25 Ensure 'Deny log on as a batch job' to include 'Guests, Enterprise Admins group, and Domain Admins group' (STIG MS only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.28 Ensure 'Deny log on as a service' to include 'Enterprise Admins group and Domain Admins Group' (STIG MS only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.31 Ensure 'Deny log on locally' to include 'Guests, Enterprise Admins group, and Domain Admins group' (STIG MS only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.35 Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account, Enterprise Admins group, and Domain Admins group' (STIG MS only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.37 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.38 Ensure 'Force shutdown from a remote system' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.39 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.42 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.44 Ensure 'Increase scheduling priority' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.45 Ensure 'Load and unload device drivers' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.46 Ensure 'Lock pages in memory' is set to 'No One'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.50 Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only)

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.52 Ensure 'Modify firmware environment values' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.53 Ensure 'Perform volume maintenance tasks' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.54 Ensure 'Profile single process' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.57 Ensure 'Restore files and directories' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.60 Ensure 'Take ownership of files or other objects' is set to 'Administrators'

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

2.3.1.4 Ensure 'Accounts: Guest account status' is set to 'Disabled'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.3.1.5 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'

IDENTIFICATION AND AUTHENTICATION

2.3.1.6 Configure 'Accounts: Rename administrator account'

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION

2.3.1.7 Configure 'Accounts: Rename guest account'

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION

2.3.2.1 Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'

AUDIT AND ACCOUNTABILITY

2.3.6.1 Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.6.2 Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.6.3 Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled'

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.6.4 Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled'

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0'

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.6.6 Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled'

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.7.2 Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not 0'

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION