UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Windows 8 / 8.1 Security Technical Implementation Guide


Overview

Date Finding Count (247)
2014-04-08 CAT I (High): 23 CAT II (Med): 160 CAT III (Low): 64
STIG Description
The Windows 8 / 8.1 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil.

Available Profiles



Findings (MAC I - Mission Critial Classified)

Finding ID Severity Title
V-1073 High Systems must be maintained at a supported service pack level.
V-34974 High The Windows Installer Always install with elevated privileges must be disabled.
V-26479 High No accounts must have the Create a token object user right.
V-36718 High The Windows Remote Management (WinRM) service must not use Basic authentication.
V-36712 High The Windows Remote Management (WinRM) client must not use Basic authentication.
V-6834 High Anonymous access to Named Pipes and Shares must be restricted.
V-1159 High The Recovery Console option must be set to prevent automatic logon to the system.
V-1153 High The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.
V-2372 High Reversible password encryption must be disabled.
V-2374 High Autoplay must be disabled for all drives.
V-1093 High Anonymous enumeration of shares must be restricted.
V-3379 High The system must be configured to prevent the storage of the LAN Manager hash of passwords.
V-26283 High Anonymous enumeration of SAM accounts must not be allowed.
V-18010 High Unauthorized accounts must not have the Debug programs user right.
V-3338 High Named pipes that can be accessed anonymously must be configured to contain no values.
V-3339 High Unauthorized remotely accessible registry paths must not be configured.
V-22692 High The default autorun behavior must be configured to prevent autorun commands.
V-21973 High Autoplay must be turned off for non-volume devices.
V-3343 High Solicited Remote Assistance must not be allowed.
V-3340 High Network shares that can be accessed anonymously must not be allowed.
V-3344 High Local accounts with blank passwords must be restricted to prevent access from the network.
V-4443 High Unauthorized remotely accessible registry paths and sub-paths must not be configured.
V-1102 High No accounts must be granted the Act as part of the operating system user right.
V-14258 Medium Search Companion must be prevented from automatically downloading content updates.
V-14259 Medium Printing over HTTP must be prevented.
V-26576 Medium The IP-HTTPS IPv6 transition technology must be disabled.
V-26577 Medium The ISATAP IPv6 transition technology must be disabled.
V-26575 Medium The 6to4 IPv6 transition technology must be disabled.
V-26486 Medium The Deny log on through Remote Desktop Services user right on workstations must at a minimum be configured to prevent access from highly privileged domain accounts and local administrator accounts on domain systems and unauthenticated access on all systems.
V-26553 Medium The system must be configured to audit System - Security State Change successes.
V-3381 Medium The system must be configured to the required LDAP client signing level.
V-3380 Medium The system must be configured to force users to log off when their allowed logon hours expire.
V-14243 Medium The system must require username and password to elevate a running application.
V-36714 Medium The Windows Remote Management (WinRM) client must not use Digest authentication.
V-26473 Medium Unauthorized accounts must not have the Allow log on through Remote Desktop Services user right.
V-36711 Medium The Windows Store application must be turned off.
V-26533 Medium The system must be configured to audit Account Management - Other Account Management Events successes.
V-15700 Medium Remote access to the Plug and Play interface must be disabled for device installation.
V-14230 Medium Audit policy using subcategories must be enabled.
V-3377 Medium The system must be configured to prevent anonymous users from having the same rights as the Everyone group.
V-16008 Medium Windows must elevate all applications in User Account Control, not just signed ones.
V-3666 Medium The system must be configured to meet the minimum session security requirement for NTLM SSP based servers.
V-26503 Medium Unauthorized accounts must not have the Replace a process level token user right.
V-14249 Medium Local drives must be prevented from sharing with Remote Desktop Session Hosts.
V-1164 Medium Outgoing secure channel traffic must be signed when possible.
V-1166 Medium The Windows SMB client must be enabled to perform SMB packet signing when possible.
V-1163 Medium Outgoing secure channel traffic must be encrypted when possible.
V-1162 Medium The Windows SMB server must perform SMB packet signing when possible.
V-3471 Medium The system must be configured to prevent automatic forwarding of error information.
V-3470 Medium The system must be configured to prevent unsolicited remote assistance offers.
V-3385 Medium The system must be configured to require case insensitivity for non-Windows subsystems.
V-36708 Medium The location feature must be turned off.
V-3479 Medium The system must be configured to use Safe DLL Search Mode.
V-36700 Medium The password reveal button must not be displayed.
V-14242 Medium User Account Control must virtualize file and registry write failures to per-user locations.
V-26582 Medium The System event log must be configured to a minimum size requirement.
V-26581 Medium The Setup event log must be configured to a minimum size requirement.
V-26580 Medium The Security event log must be configured to a minimum size requirement.
V-15697 Medium The Responder network protocol driver must be disabled.
V-15696 Medium The Mapper I/O network protocol (LLTDIO) driver must be disabled.
V-6836 Medium Passwords must, at a minimum, be 14 characters.
V-6832 Medium The Windows SMB client must be configured to always perform SMB packet signing.
V-6833 Medium The Windows SMB server must be configured to always perform SMB packet signing.
V-6831 Medium Outgoing secure channel traffic must be encrypted or signed.
V-14261 Medium Windows must be prevented from using Windows Update to search for drivers.
V-14260 Medium Downloading print driver packages over HTTP must be prevented.
V-1154 Medium The Ctrl+Alt+Del security attention sequence for logons must be enabled.
V-1155 Medium The Deny access to this computer from the network user right on workstations must be configured to prevent access from highly privileged domain accounts and local administrator accounts on domain systems and unauthenticated access on all systems.
V-1157 Medium The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
V-1099 Medium The lockout duration must be configured to require an administrator to unlock an account.
V-1098 Medium The period of time before the bad logon counter is reset must meet minimum requirements.
V-3383 Medium The system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
V-1097 Medium The number of allowed bad logon attempts must meet minimum requirements.
V-3382 Medium The system must be configured to meet the minimum session security requirement for NTLM SSP based clients.
V-3376 Medium The system must be configured to prevent the storage of passwords and credentials.
V-26578 Medium The Teredo IPv6 transition technology must be disabled.
V-3374 Medium The system must be configured to require a strong session key.
V-3378 Medium The system must be configured to use the Classic security model.
V-15682 Medium Attachments must be prevented from being downloaded from RSS feeds.
V-15683 Medium File Explorer shell protocol must run in protected mode.
V-1145 Medium Automatic logons must be disabled.
V-1141 Medium Unencrypted passwords must not be sent to third-party SMB Server.
V-15685 Medium Users must be prevented from changing installation options.
V-1171 Medium Ejection of removable NTFS media must be restricted to Administrators.
V-26529 Medium The system must be configured to audit Account Logon - Credential Validation successes.
V-36720 Medium The Windows Remote Management (WinRM) service must not store RunAs credentials.
V-36684 Medium Local users on domain-joined computers must not be enumerated.
V-36687 Medium App notifications on the lock screen must be turned off.
V-1104 Medium The maximum password age must meet requirements.
V-36681 Medium Copying of user input methods to the system account for sign-in must be prevented.
V-36680 Medium Access to the Windows Store must be turned off.
V-36683 Medium Connected users on domain-joined computers must not be enumerated.
V-3458 Medium Remote Desktop Services must be configured to disconnect an idle session after the specified time period.
V-36719 Medium The Windows Remote Management (WinRM) service must not allow unencrypted traffic.
V-14239 Medium User Account Control must only elevate UIAccess applications that are installed in secure locations.
V-3453 Medium Remote Desktop Services must always prompt a client for passwords upon connection.
V-3457 Medium Remote Desktop Services must be configured to set a time limit for disconnected sessions.
V-3456 Medium Remote Desktop Services must delete temporary folders when a session is terminated.
V-3455 Medium Remote Desktop Services must be configured to use session-specific temporary folders.
V-3454 Medium Remote Desktop Services must be configured with the client connection encryption set to the required level.
V-36689 Medium Signing in using a PIN must be turned off.
V-26483 Medium The Deny log on as a batch job user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
V-15674 Medium The Internet File Association service must be turned off.
V-14241 Medium User Account Control must switch to the secure desktop when prompting for elevation.
V-14240 Medium User Account Control must run all administrators in Admin Approval Mode, enabling UAC.
V-26538 Medium The system must be configured to audit Account Management - User Account Management failures.
V-26539 Medium The system must be configured to audit Detailed Tracking - Process Creation successes.
V-14247 Medium Passwords must not be saved in the Remote Desktop Client.
V-14248 Medium Users must be prevented from connecting using Remote Desktop Services.
V-26530 Medium The system must be configured to audit Account Logon - Credential Validation failures.
V-26537 Medium The system must be configured to audit Account Management - User Account Management successes.
V-26535 Medium The system must be configured to audit Account Management - Security Group Management successes.
V-1115 Medium The built-in administrator account must be renamed.
V-14237 Medium User Account Control must be configured to detect application installations and prompt for elevation.
V-1114 Medium The built-in guest account must be renamed.
V-3480 Medium Media Player must be configured to prevent automatic checking for updates.
V-15699 Medium The Windows Connect Now wizards must be disabled.
V-15666 Medium Windows Peer-to-Peer networking services must be turned off.
V-15667 Medium Network Bridges must be prohibited in Windows.
V-14229 Medium Auditing of Backup and Restore Privileges must be turned off.
V-21975 Medium The system must be prevented from joining a homegroup.
V-14256 Medium Web publishing and online ordering wizards must be prevented from downloading a list of providers.
V-14257 Medium Windows Messenger must be prevented from collecting anonymous information about how the service is used.
V-14254 Medium Client computers must be required to authenticate for RPC communication.
V-14255 Medium File and folder Publish to Web option must be unavailable in Windows folders.
V-14253 Medium Unauthenticated RPC clients must be restricted from connecting to the RPC server.
V-15684 Medium Users must be notified if a web-based program attempts to install software.
V-26549 Medium The system must be configured to audit Privilege Use - Sensitive Privilege Use successes.
V-26548 Medium The system must be configured to audit Policy Change - Authentication Policy Change successes.
V-26547 Medium The system must be configured to audit Policy Change - Audit Policy Change failures.
V-26546 Medium The system must be configured to audit Policy Change - Audit Policy Change successes.
V-26545 Medium The system must be configured to audit Object Access - Registry failures.
V-26544 Medium The system must be configured to audit Object Access - File System failures.
V-26543 Medium The system must be configured to audit Logon/Logoff - Special Logon successes.
V-26542 Medium The system must be configured to audit Logon/Logoff - Logon failures.
V-26541 Medium The system must be configured to audit Logon/Logoff - Logon successes.
V-26540 Medium The system must be configured to audit Logon/Logoff - Logoff successes.
V-14228 Medium Auditing Access of Global System Objects must be turned off.
V-21980 Medium Explorer Data Execution Prevention must be enabled.
V-36713 Medium The Windows Remote Management (WinRM) client must not allow unencrypted traffic.
V-36698 Medium The use of biometrics must be disabled.
V-4448 Medium Group Policy objects must be reprocessed even if they have not changed.
V-4447 Medium The Remote Desktop Session Host must require secure RPC communications.
V-36770 Medium Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.
V-26495 Medium Unauthorized accounts must not have the Log on as a batch job user right.
V-26494 Medium Unauthorized accounts must not have the Lock pages in memory user right.
V-26497 Medium Unauthorized accounts must not have the Modify an object label user right.
V-26558 Medium The system must be configured to audit System - System Integrity failures.
V-26554 Medium The system must be configured to audit System - Security State Change failures.
V-26556 Medium The system must be configured to audit System - Security System Extension failures.
V-26557 Medium The system must be configured to audit System - System Integrity successes.
V-26550 Medium The system must be configured to audit Privilege Use - Sensitive Privilege Use failures.
V-26551 Medium The system must be configured to audit System - IPSec Driver successes.
V-26552 Medium The system must be configured to audit System - IPSec Driver failures.
V-36674 Medium Simultaneous connections to the Internet or a Windows domain must be limited.
V-36675 Medium Connections to non-domain networks when connected to a domain authenticated network must be blocked.
V-15706 Medium The user must be prompted for a password on resume from sleep (plugged in).
V-15705 Medium Users must be prompted for a password on resume from sleep (on battery).
V-36679 Medium Early Launch Antimalware, Boot-Start Driver Initialization Policy must be enabled and configured to only Good and Unknown.
V-26536 Medium The system must be configured to audit Account Management - Security Group Management failures.
V-16020 Medium The Windows Customer Experience Improvement Program must be disabled.
V-1107 Medium The password uniqueness must meet minimum requirements.
V-1105 Medium The minimum password age must meet requirements.
V-26534 Medium The system must be configured to audit Account Management - Other Account Management Events failures.
V-21951 Medium Services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity vs. authenticating anonymously.
V-21950 Medium The service principal name (SPN) target name validation level must be configured to Accept if provided by client.
V-21953 Medium PKU2U authentication using online identities must be prevented.
V-21952 Medium NTLM must be prevented from falling back to a Null session.
V-21954 Medium Kerberos encryption types must be configured to prevent the use of DES encryption suites.
V-26579 Medium The Application event log must be configured to a minimum size requirement.
V-14234 Medium User Account Control approval mode for the built-in Administrator must be enabled.
V-14235 Medium User Account Control must, at minimum, prompt administrators for consent on the secure desktop.
V-14236 Medium User Account Control must, at minimum, prompt users for credentials on the secure desktop.
V-28285 Medium Unauthorized users must not have the Log on as a service user right.
V-15698 Medium The configuration of wireless devices using Windows Connect Now must be disabled.
V-26481 Medium Unauthorized accounts must not have the Create permanent shared objects user right.
V-1113 Medium The built-in guest account must be disabled.
V-26487 Medium Unauthorized accounts must not have the Enable computer and user accounts to be trusted for delegation user right.
V-26484 Medium The Deny log on as a service user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
V-26485 Medium The Deny log on locally user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
V-15711 Medium Indexing of encrypted files must be turned off.
V-15713 Medium Windows Defender SpyNet membership must be disabled.
V-26555 Medium The system must be configured to audit System - Security System Extension successes.
V-1075 Low The shutdown option must be available from the logon dialog box.
V-1174 Low The amount of idle time required before suspending a session must be properly set.
V-1172 Low Users must be warned in advance of their passwords expiring.
V-1173 Low The default permissions of global system objects must be increased.
V-36710 Low Automatic download of updates from the Windows Store must be turned off.
V-1165 Low The computer account password must not be prevented from being reset.
V-36690 Low The display must turn off after 20 minutes of inactivity when the system is running on battery.
V-36707 Low The Windows SmartScreen must be turned off.
V-11806 Low The system must be configured to prevent the display of the last username on the logon screen.
V-1158 Low The Recovery Console SET command must be disabled.
V-1150 Low The built-in Microsoft password complexity filter must be enabled.
V-1091 Low The system must not halt when the security event log has reached its maximum size.
V-3373 Low The maximum age for machine account passwords must be set to requirements.
V-3375 Low Domain Controller authentication must not be required to unlock the workstation.
V-15686 Low Non-administrators must be prevented from applying vendor-signed updates.
V-1136 Low Users must be forcibly disconnected when their logon hours expire.
V-15676 Low The Order Prints Online wizard must be turned off.
V-15675 Low Windows Registration Wizard must be turned off.
V-15673 Low The Internet Connection Wizard must not download a list of Internet Service Providers (ISPs) from Microsoft.
V-15671 Low Root Certificates must not be updated automatically from the Microsoft site.
V-15680 Low The classic logon screen must be required for user logons.
V-36692 Low Remote assistance must display a warning message when allowing helpdesk personnel to control a system.
V-36691 Low The display must turn off after 20 minutes of inactivity when the system is plugged in.
V-36696 Low The detection of compatibility issues for applications and drivers must be turned off.
V-36694 Low Remote assistance must display a warning message when allowing helpdesk personnel to connect to a system.
V-15703 Low Users must not be prompted to search Windows Update for device drivers.
V-4438 Low The system must limit how many times unacknowledged TCP data is retransmitted.
V-4111 Low The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.
V-4108 Low The system must generate an audit event when the audit log reaches a percentage of full threshold.
V-21974 Low Downloading of game update information must be turned off.
V-21971 Low The Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.
V-21970 Low Responsiveness events must be prevented from being aggregated and sent to Microsoft.
V-45589 Low A group named DenyNetworkAccess must be defined on domain systems to include all local administrator accounts. (Windows 8)
V-4113 Low The system must be configured to limit how often keep-alive packets are sent.
V-4112 Low The system must be configured to disable the Internet Router Discovery Protocol (IRDP).
V-4110 Low The system must be configured to prevent IP source routing.
V-4116 Low The system must be configured to ignore NetBIOS name release requests except from WINS servers.
V-4442 Low The system must be configured to have password protection take effect within a limited time frame when the screen saver becomes active.
V-21964 Low Device metadata retrieval from the Internet must be prevented.
V-21965 Low Device driver searches using Windows Update must be prevented.
V-21966 Low Handwriting personalization data sharing with Microsoft must be prevented.
V-21967 Low Microsoft Support Diagnostic Tool (MSDT) interactive communication with Microsoft must be prevented.
V-21960 Low Domain users must be required to elevate when setting a networks location.
V-21961 Low All Direct Access traffic must be routed through the internal network.
V-21963 Low Windows Update must be prevented from searching for point and print drivers.
V-28504 Low Windows must be prevented from sending an error report when a device driver requests additional software during installation.
V-21969 Low Access to Windows Online Troubleshooting Service (WOTS) must be prevented.
V-15701 Low A system restore point must be created when a new device driver is installed.
V-36677 Low Optional component installation and component repair must be prevented from using Windows Update.
V-15707 Low Remote Assistance log files must be generated.
V-15704 Low Errors in handwriting recognition on tablet PCs must not be reported to Microsoft.
V-15709 Low Game explorer information must not be downloaded from Windows Metadata Services.
V-36678 Low Device driver updates must only search managed servers, not Windows Update.
V-15702 Low An Error Report must not be sent when a generic device driver is installed.
V-15717 Low Additional data requests in response to Error Reporting must be declined.
V-21955 Low IPv6 source routing must be configured to highest protection.
V-21956 Low IPv6 TCP data retransmissions must be configured to prevent resources from becoming exhausted.
V-14231 Low The system must be configured to hide the computer from the browse list.
V-14232 Low IPSec Exemptions must be limited.
V-36697 Low Trusted app installation must be enabled to allow for signed enterprise line of business apps.
V-15712 Low Indexing of mail items in Exchange Folder when Outlook is running in uncached mode must be turned off.
V-15714 Low Error Reporting events must be logged in the system event log.
V-15718 Low Turning off File Explorer heap termination on corruption must be disabled.
V-15719 Low Users must be notified if the logon server was inaccessible and cached credentials were used.
V-39137 unknown The Enhanced Mitigation Experience Toolkit (EMET) must be installed on the system.
V-36705 unknown The Enhanced Mitigation Experience Toolkit (EMET) system-wide Data Execution Prevention (DEP) must be enabled and configured to at least Application Opt Out.
V-36706 unknown The Enhanced Mitigation Experience Toolkit (EMET) system-wide Structured Exception Handler Overwrite Protection (SEHOP) must be configured to Application Opt Out.
V-36701 unknown The Enhanced Mitigation Experience Toolkit (EMET) system-wide Address Space Layout Randomization (ASLR) must be enabled and configured to Application Opt In.
V-36702 unknown The Enhanced Mitigation Experience Toolkit (EMET) Default Protections for Internet Explorer must be enabled.
V-36703 unknown The Enhanced Mitigation Experience Toolkit (EMET) Default Protections for Recommended Software must be enabled.
V-36704 unknown The Enhanced Mitigation Experience Toolkit (EMET) Default Protections for Popular Software must be enabled.