Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-1128 | 1.016 | SV-32255r1_rule | ECSC-1 | Low |
Description |
---|
Security configuration tools, such as Security Templates and Group Policy, allow system administrators to consolidate all security-related system settings into a single configuration file. These settings can then be applied consistently to any number of Windows machines. The Security Configuration tools can use the same configuration file to check platforms for compliance with security policy. |
STIG | Date |
---|---|
Windows Server 2008 R2 Member Server Security Technical Implementation Guide | 2015-06-16 |
Check Text ( C-32708r1_chk ) |
---|
Interview the SA to determine if the Security Configuration tools, or equivalent process, is being used to configure Windows systems to meet security requirements. The Microsoft Security Configuration tools (such as Security Templates and Group Policy that are integrated into Windows) should be used to configure platforms for security compliance. If an alternate method is used to configure a system (e.g., manually - using the DISA Windows STIGs, etc.) that achieves the same configured result, then this is acceptable. |
Fix Text (F-37r1_fix) |
---|
Security configuration tools or equivalent should be used to configure Windows systems to meet security requirements. |