UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Active Directory Domain Security Technical Implementation Guide (STIG)


Overview

Date Finding Count (40)
2017-12-15 CAT I (High): 5 CAT II (Med): 30 CAT III (Low): 5
STIG Description
This STIG provides focused security requirements for the AD or Active Directory Domain Services (AD DS) element for Windows Servers operating systems. These requirements apply to the domain and can typically be reviewed once per AD domain. The separate Active Directory Forest STIG contains forest level requirements. Systems must also be reviewed using the applicable Windows STIG. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Public)

Finding ID Severity Title
V-8534 High Interconnections between DoD directory services of different classification levels must use a cross-domain solution that is approved for use with inter-classification trusts.
V-8536 High A controlled interface must have interconnections among DoD information systems operating between DoD and non-DoD systems or networks.
V-36435 High Delegation of privileged accounts must be prohibited.
V-36432 High Membership to the Domain Admins group must be restricted to accounts used only to manage the Active Directory domain and domain controllers.
V-36431 High Membership to the Enterprise Admins group must be restricted to accounts used only to manage the Active Directory Forest.
V-8538 Medium Security identifiers (SIDs) must be configured to use only authentication data of directly trusted external or forest trust.
V-78131 Medium Accounts with domain level administrative privileges must be members of the Protected Users group in domains with a domain functional level of Windows 2012 R2 or higher.
V-43714 Medium Systems must be monitored for remote desktop logons.
V-43713 Medium Systems must be monitored for attempts to use local accounts to log on remotely from other systems.
V-43711 Medium Separate domain administrative accounts must be used to manage AD admin platforms from any domain accounts used on, or used to manage, non-AD admin platforms.
V-43710 Medium Systems used to manage Active Directory (AD admin platforms) must be Windows 7, Windows Server 2008 R2, or later versions of Windows.
V-8553 Medium Inter-site replication must be enabled and configured to occur at least daily.
V-8551 Medium The domain functional level must be at a Windows Server version still supported by Microsoft.
V-43652 Medium Separate domain accounts must be used to manage public facing servers from any domain accounts used to manage internal servers.
V-25385 Medium Active Directory data must be backed up daily for systems with a Risk Management Framework categorization for Availability of moderate or high. Systems with a categorization of low must be backed up weekly.
V-53727 Medium Domain controllers must be blocked from Internet access.
V-36438 Medium Local administrator accounts on domain systems must not share the same password.
V-36436 Medium Only systems dedicated for the sole purpose of managing Active Directory must be used to manage Active Directory remotely.
V-36437 Medium Dedicated systems used for managing Active Directory remotely must be blocked from Internet Access.
V-36434 Medium Administrators must have separate accounts specifically for managing domain workstations.
V-36433 Medium Administrators must have separate accounts specifically for managing domain member servers.
V-25840 Medium The Directory Service Restore Mode (DSRM) password must be changed at least annually.
V-8522 Medium A VPN must be used to protect directory network traffic for directory service implementation spanning enclave boundaries.
V-8523 Medium If a VPN is used in the AD implementation, the traffic must be inspected by the network Intrusion detection system (IDS).
V-43648 Medium Separate smart cards must be used for Enterprise Admin (EA) and Domain Admin (DA) accounts from smart cards used for other accounts.
V-8524 Medium Active Directory must be supported by multiple domain controllers where the Risk Management Framework categorization for Availability is moderate or high.
V-8548 Medium Membership in the Group Policy Creator Owners and Incoming Forest Trust Builders groups must be limited.
V-8549 Medium Accounts from outside directories that are not part of the same organization or are not subject to the same security policies must be removed from all highly privileged groups.
V-43712 Medium Usage of administrative accounts must be monitored for suspicious and anomalous activity.
V-8540 Medium Selective Authentication must be enabled on outgoing forest trusts.
V-44058 Medium Communications from AD admin platforms must be blocked, except with the domain controllers being managed.
V-8547 Medium The Anonymous Logon and Everyone groups must not be members of the Pre-Windows 2000 Compatible Access group.
V-44059 Medium Windows service \ application accounts with administrative privileges and manually managed passwords, must have passwords changed at least every 60 days.
V-72821 Medium All accounts, privileged and unprivileged, that require smart cards must have the underlying NT hash rotated at least every 60 days.
V-25997 Medium Read-only Domain Controller (RODC) architecture and configuration must comply with directory services requirements.
V-8530 Low Each cross-directory authentication configuration must be documented.
V-25841 Low Security vulnerability reviews of the domain and/or forest in which the domain controller resides must be conducted at least annually.
V-8521 Low User accounts with delegated authority must be removed from Windows built-in administrative groups or remove the delegated authority from the accounts.
V-8526 Low The impact of INFOCON changes on the cross-directory authentication configuration must be considered and procedures documented.
V-8525 Low Active Directory implementation information must be added to the organization contingency plan where the Risk Management Framework categorization for Availability is moderate or high.