UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Security configuration tools are not being used to configure platforms for security compliance.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1128 1.016 SV-25002r1_rule ECSC-1 Low
Description
Security configuration tools (such as Security Templates and Group Policy) allow system administrators to consolidate all security related system settings into a single configuration file. These settings can then be applied consistently to any number of Windows machines.
STIG Date
Windows 7 Security Technical Implementation Guide 2013-07-03

Details

Check Text ( C-39088r1_chk )
Verify that security configuration tools, or an equivalent process, is being used to configure Windows systems to meet security requirements. Security configuration tools that are integrated into Windows (such as Security Templates and Group Policy) should be used to configure platforms for security compliance.

If an alternate method is used to configure a system (e.g., manually using the DISA Windows Security STIGs, etc.) that achieves the same configured result, then this is acceptable.

Fix Text (F-37r1_fix)
Security configuration tools or equivalent should be used to configure Windows systems to meet security requirements.