UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Windows Server 2012/2012 R2 Domain Controller Security Technical Implementation Guide


Overview

Date Finding Count (369)
2018-09-05 CAT I (High): 41 CAT II (Med): 266 CAT III (Low): 62
STIG Description
The Windows Server 2012/2012 R2 Domain Controller Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Public)

Finding ID Severity Title
V-36718 High The Windows Remote Management (WinRM) service must not use Basic authentication.
V-36712 High The Windows Remote Management (WinRM) client must not use Basic authentication.
V-6834 High Anonymous access to Named Pipes and Shares must be restricted.
V-18010 High The Debug programs user right must only be assigned to the Administrators group.
V-1093 High Anonymous enumeration of shares must be restricted.
V-26283 High Anonymous enumeration of SAM accounts must not be allowed.
V-1121 High File Transfer Protocol (FTP) servers must be configured to prevent access to the system drive.
V-1127 High Only administrators responsible for the domain controller must have Administrator rights on the system.
V-39331 High The Active Directory SYSVOL directory must have the proper access control permissions.
V-39332 High The Active Directory Domain Controllers Organizational Unit (OU) object must have the proper access control permissions.
V-39333 High Domain created Active Directory Organizational Unit (OU) objects must have proper access control permissions.
V-26070 High Standard user accounts must only have Read permissions to the Winlogon registry key.
V-8316 High Active Directory data files must have proper access control permissions.
V-1152 High Anonymous access to the registry must be restricted.
V-1153 High The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.
V-2372 High Reversible password encryption must be disabled.
V-2374 High Autoplay must be disabled for all drives.
V-22692 High The default Autorun behavior must be configured to prevent Autorun commands.
V-26683 High PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA).
V-36451 High Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
V-3338 High Named pipes that can be accessed anonymously must be configured with limited values on domain controllers.
V-3337 High Anonymous SID/Name translation must not be allowed.
V-14798 High Directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
V-3343 High Solicited Remote Assistance must not be allowed.
V-3340 High Network shares that can be accessed anonymously must not be allowed.
V-3344 High Local accounts with blank passwords must be restricted to prevent access from the network.
V-1102 High The Act as part of the operating system user right must not be assigned to any groups or accounts.
V-1074 High The Windows 2012 / 2012 R2 system must use an anti-virus program.
V-1073 High Systems must be maintained at a supported service pack level.
V-34974 High The Windows Installer Always install with elevated privileges option must be disabled.
V-26479 High The Create a token object user right must not be assigned to any groups or accounts.
V-36659 High Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
V-1081 High Local volumes must use a format that supports NTFS attributes.
V-32282 High Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key.
V-3379 High The system must be configured to prevent the storage of the LAN Manager hash of passwords.
V-33673 High Active Directory Group Policy objects must have proper access control permissions.
V-7002 High Windows 2012/2012 R2 accounts must be configured to require passwords.
V-21973 High Autoplay must be turned off for non-volume devices.
V-4443 High Unauthorized remotely accessible registry paths and sub-paths must not be configured.
V-3339 High Unauthorized remotely accessible registry paths must not be configured.
V-14820 High Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).
V-36719 Medium The Windows Remote Management (WinRM) service must not allow unencrypted traffic.
V-36714 Medium The Windows Remote Management (WinRM) client must not use Digest authentication.
V-36713 Medium The Windows Remote Management (WinRM) client must not allow unencrypted traffic.
V-36711 Medium The Windows Store application must be turned off.
V-16000 Medium The system must be configured to ensure smart card devices can be redirected to the Remote Desktop session. (Remote Desktop Services Role).
V-16008 Medium Windows must elevate all applications in User Account Control, not just signed ones.
V-26500 Medium The Profile single process user right must only be assigned to the Administrators group.
V-1168 Medium Members of the Backup Operators group must be documented.
V-26504 Medium The Restore files and directories user right must only be assigned to the Administrators group.
V-1164 Medium Outgoing secure channel traffic must be signed when possible.
V-1166 Medium The Windows SMB client must be enabled to perform SMB packet signing when possible.
V-1163 Medium Outgoing secure channel traffic must be encrypted when possible.
V-1162 Medium The Windows SMB server must perform SMB packet signing when possible.
V-26469 Medium The Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts.
V-6836 Medium Passwords must, at a minimum, be 14 characters.
V-6832 Medium The Windows SMB client must be configured to always perform SMB packet signing.
V-6833 Medium The Windows SMB server must be configured to always perform SMB packet signing.
V-6831 Medium Outgoing secure channel traffic must be encrypted or signed.
V-1099 Medium Windows 2012 account lockout duration must be configured to 15 minutes or greater.
V-1098 Medium The reset period for the account lockout counter must be configured to 15 minutes or greater on Windows 2012.
V-3449 Medium Remote Desktop Services must limit users to one remote session.
V-1097 Medium The number of allowed bad logon attempts must meet minimum requirements.
V-6840 Medium Windows 2012/2012 R2 passwords must be configured to expire.
V-4407 Medium Domain controllers must require LDAP access signing.
V-14270 Medium The system must notify antivirus when file attachments are opened.
V-14241 Medium User Account Control must switch to the secure desktop when prompting for elevation.
V-14240 Medium User Account Control must run all administrators in Admin Approval Mode, enabling UAC.
V-36698 Medium The use of biometrics must be disabled.
V-14242 Medium User Account Control must virtualize file and registry write failures to per-user locations.
V-14247 Medium Passwords must not be saved in the Remote Desktop Client.
V-14249 Medium Local drives must be prevented from sharing with Remote Desktop Session Hosts. (Remote Desktop Services Role).
V-33664 Medium The system must be configured to audit DS Access - Directory Service Access failures.
V-33665 Medium The system must be configured to audit DS Access - Directory Service Changes successes.
V-57633 Medium The system must be configured to audit Policy Change - Authorization Policy Change successes.
V-57637 Medium The operating system must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
V-33663 Medium The system must be configured to audit DS Access - Directory Service Access successes.
V-57639 Medium Users must be required to enter a password to access private keys stored on the computer.
V-1120 Medium File Transfer Protocol (FTP) servers must be configured to prevent anonymous logons.
V-15666 Medium Windows Peer-to-Peer networking services must be turned off.
V-15667 Medium Network Bridges must be prohibited in Windows.
V-40198 Medium Members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
V-21980 Medium Explorer Data Execution Prevention must be enabled.
V-2380 Medium The computer clock synchronization tolerance must be limited to 5 minutes or less.
V-78059 Medium Windows Server 2012/2012 R2 must be configured to audit Logon/Logoff - Account Lockout failures.
V-78057 Medium Windows Server 2012/2012 R2 must be configured to audit Logon/Logoff - Account Lockout successes.
V-26494 Medium The Lock pages in memory user right must not be assigned to any groups or accounts.
V-26496 Medium The Manage auditing and security log user right must only be assigned to the Administrators group.
V-26558 Medium The system must be configured to audit System - System Integrity failures.
V-26490 Medium The Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service.
V-26493 Medium The Load and unload device drivers user right must only be assigned to the Administrators group.
V-26492 Medium The Increase scheduling priority user right must only be assigned to the Administrators group.
V-26557 Medium The system must be configured to audit System - System Integrity successes.
V-26499 Medium The Perform volume maintenance tasks user right must only be assigned to the Administrators group.
V-26498 Medium The Modify firmware environment values user right must only be assigned to the Administrators group.
V-26552 Medium The system must be configured to audit System - IPsec Driver failures.
V-26553 Medium The system must be configured to audit System - Security State Change successes.
V-15700 Medium Remote access to the Plug and Play interface must be disabled for device installation.
V-15706 Medium The user must be prompted to authenticate on resume from sleep (plugged in).
V-15705 Medium Users must be prompted to authenticate on resume from sleep (on battery).
V-16048 Medium Windows Help Ratings feedback must be turned off.
V-26555 Medium The system must be configured to audit System - Security System Extension successes.
V-26506 Medium The Take ownership of files or other objects user right must only be assigned to the Administrators group.
V-26550 Medium The system must be configured to audit Privilege Use - Sensitive Privilege Use failures.
V-26551 Medium The system must be configured to audit System - IPsec Driver successes.
V-3385 Medium The system must be configured to require case insensitivity for non-Windows subsystems.
V-3383 Medium The system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
V-3382 Medium The system must be configured to meet the minimum session security requirement for NTLM SSP-based clients.
V-3381 Medium The system must be configured to the required LDAP client signing level.
V-3380 Medium The system must be configured to force users to log off when their allowed logon hours expire.
V-39330 Medium The Active Directory RID Manager$ object must be configured with proper audit settings.
V-39334 Medium Domain controllers must have a PKI server certificate.
V-26600 Medium The Fax service must be disabled if installed.
V-26602 Medium The Microsoft FTP service must not be installed unless required.
V-26604 Medium The Peer Networking Identity Manager service must be disabled if installed.
V-26605 Medium The Simple TCP/IP Services service must be disabled if installed.
V-26606 Medium The Telnet service must be disabled if installed.
V-36670 Medium Audit data must be reviewed on a regular basis.
V-36671 Medium Audit data must be retained for at least one year.
V-36672 Medium Audit records must be backed up onto a different system or media than the system being audited.
V-57719 Medium The operating system must, at a minimum, off-load audit records of interconnected systems in real time and off-load standalone systems weekly.
V-36708 Medium The location feature must be turned off.
V-36709 Medium Basic authentication for RSS feeds over HTTP must be turned off.
V-36707 Medium Windows SmartScreen must be enabled on Windows 2012/2012 R2.
V-36700 Medium The password reveal button must not be displayed.
V-30016 Medium Unauthorized accounts must not have the Add workstations to domain user right.
V-15697 Medium The Responder network protocol driver must be disabled.
V-15696 Medium The Mapper I/O network protocol (LLTDIO) driver must be disabled.
V-15699 Medium The Windows Connect Now wizards must be disabled.
V-15698 Medium The configuration of wireless devices using Windows Connect Now must be disabled.
V-1150 Medium The built-in Windows password complexity policy must be enabled.
V-1154 Medium The Ctrl+Alt+Del security attention sequence for logons must be enabled.
V-1155 Medium The Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
V-1157 Medium The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
V-2377 Medium The Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.
V-2376 Medium Kerberos user logon restrictions must be enforced.
V-2379 Medium The Kerberos policy user ticket renewal maximum lifetime must be limited to 7 days or less.
V-2378 Medium The Kerberos user ticket lifetime must be limited to 10 hours or less.
V-15991 Medium UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.
V-15997 Medium Users must be prevented from mapping local COM ports and redirecting data from the Remote Desktop Session Host to local COM ports. (Remote Desktop Services Role).
V-14225 Medium Windows 2012/2012 R2 password for the built-in Administrator account must be changed at least annually or when a member of the administrative team leaves the organization.
V-15998 Medium Users must be prevented from mapping local LPT ports and redirecting data from the Remote Desktop Session Host to local LPT ports. (Remote Desktop Services Role).
V-15999 Medium Users must be prevented from redirecting Plug and Play devices to the Remote Desktop Session Host. (Remote Desktop Services Role).
V-78063 Medium Windows Server 2012/2012 R2 must be configured to audit System - Other System Events failures.
V-78061 Medium Windows Server 2012/2012 R2 must be configured to audit System - Other System Events successes.
V-3453 Medium Remote Desktop Services must always prompt a client for passwords upon connection.
V-3456 Medium Remote Desktop Services must delete temporary folders when a session is terminated.
V-3455 Medium Remote Desktop Services must be configured to use session-specific temporary folders.
V-3454 Medium Remote Desktop Services must be configured with the client connection encryption set to the required level.
V-73523 Medium The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.
V-14259 Medium Printing over HTTP must be prevented.
V-1119 Medium The system must not boot into multiple operating systems (dual-boot).
V-1114 Medium The built-in guest account must be renamed.
V-1115 Medium The built-in administrator account must be renamed.
V-1113 Medium The built-in guest account must be disabled.
V-57721 Medium Event Viewer must be protected from unauthorized modification and deletion.
V-14268 Medium Zone information must be preserved when saving attachments.
V-16021 Medium The Windows Help Experience Improvement Program must be disabled.
V-16020 Medium The Windows Customer Experience Improvement Program must be disabled.
V-21951 Medium Services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity vs. authenticating anonymously.
V-21950 Medium The service principal name (SPN) target name validation level must be turned off.
V-21953 Medium PKU2U authentication using online identities must be prevented.
V-21952 Medium NTLM must be prevented from falling back to a Null session.
V-21954 Medium Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.
V-26482 Medium The Create symbolic links user right must only be assigned to the Administrators group.
V-26483 Medium The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
V-26480 Medium The Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service.
V-26481 Medium The Create permanent shared objects user right must not be assigned to any groups or accounts.
V-26486 Medium The Deny log on through Remote Desktop Services user right on domain controllers must be configured to prevent unauthenticated access.
V-26487 Medium Unauthorized accounts must not have the Enable computer and user accounts to be trusted for delegation user right on domain controllers.
V-26484 Medium The Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
V-26485 Medium The Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
V-15488 Medium Active directory user accounts, including administrators, must be configured to require the use of a Common Access Card (CAC), PIV-compliant hardware token, or Alternate Logon Token (ALT) for user authentication.
V-26488 Medium The Force shutdown from a remote system user right must only be assigned to the Administrators group.
V-26489 Medium The Generate security audits user right must only be assigned to Local Service and Network Service.
V-15713 Medium Microsoft Active Protection Service membership must be disabled.
V-15505 Medium The HBSS McAfee Agent must be installed.
V-42420 Medium A host-based firewall must be installed and enabled on the system.
V-3469 Medium Group Policies must be refreshed in the background if the user is logged on.
V-15823 Medium Software certificate installation files must be removed from Windows 2012/2012 R2.
V-36679 Medium Early Launch Antimalware, Boot-Start Driver Initialization Policy must be enabled and configured to only Good and Unknown.
V-8326 Medium The directory server supporting (directly or indirectly) system access or resource authorization must run on a machine dedicated to that function.
V-8327 Medium Windows services that are critical for directory server operation must be configured for automatic startup.
V-14261 Medium Windows must be prevented from using Windows Update to search for drivers.
V-14260 Medium Downloading print driver packages over HTTP must be prevented.
V-14269 Medium Mechanisms for removing zone information from file attachments must be hidden.
V-3289 Medium Servers must have a host-based Intrusion Detection System.
V-15684 Medium Users must be notified if a web-based program attempts to install software.
V-36735 Medium The system must support automated patch management tools to facilitate flaw remediation.
V-36734 Medium The operating system must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
V-36736 Medium The system must query the certification authority to determine whether a public key certificate has been revoked before accepting the certificate for authentication purposes.
V-26579 Medium The Application event log size must be configured to 32768 KB or greater.
V-15682 Medium Attachments must be prevented from being downloaded from RSS feeds.
V-15683 Medium File Explorer shell protocol must run in protected mode.
V-1145 Medium Automatic logons must be disabled.
V-1141 Medium Unencrypted passwords must not be sent to third-party SMB Servers.
V-15685 Medium Users must be prevented from changing installation options.
V-26529 Medium The system must be configured to audit Account Logon - Credential Validation successes.
V-40177 Medium Permissions for program file directories must conform to minimum requirements.
V-40178 Medium Permissions for system drive root directory (usually C:\) must conform to minimum requirements.
V-40179 Medium Permissions for Windows installation directory must conform to minimum requirements.
V-2907 Medium System files must be monitored for unauthorized changes.
V-4447 Medium The Remote Desktop Session Host must require secure RPC communications.
V-3480 Medium Windows Media Player must be configured to prevent automatic checking for updates.
V-3481 Medium Media Player must be configured to prevent automatic Codec downloads.
V-3487 Medium Necessary services must be documented to maintain a baseline to determine if additional, unnecessary services have been added to a system.
V-72753 Medium WDigest Authentication must be disabled.
V-32274 Medium The DoD Interoperability Root CA cross-certificates must be installed into the Untrusted Certificates Store on unclassified systems.
V-32272 Medium The DoD Root CA certificates must be installed in the Trusted Root Store.
V-14229 Medium Auditing of Backup and Restore Privileges must be turned off.
V-14228 Medium Auditing the Access of Global System Objects must be turned off.
V-36773 Medium The machine inactivity limit must be set to 15 minutes, locking the system with the screensaver.
V-57653 Medium Windows 2012 / 2012 R2 must automatically remove or disable temporary user accounts after 72 hours.
V-57655 Medium Windows 2012 / 2012 R2 must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.
V-40204 Medium Only the default client printer must be redirected to the Remote Desktop Session Host. (Remote Desktop Services Role).
V-40206 Medium The Smart Card Removal Policy service must be configured to automatic.
V-40200 Medium The system must be configured to audit Object Access - Central Access Policy Staging failures.
V-40202 Medium The system must be configured to audit Object Access - Central Access Policy Staging successes.
V-73805 Medium The Server Message Block (SMB) v1 protocol must be disabled on Windows 2012 R2.
V-1107 Medium The password history must be configured to 24 passwords remembered.
V-1105 Medium The minimum password age must meet requirements.
V-1104 Medium The maximum password age must meet requirements.
V-80473 Medium Windows PowerShell must be updated to a version that supports script block logging on Windows 2012/2012 R2.
V-80477 Medium Windows PowerShell 2.0 must not be installed on Windows 2012/2012 R2.
V-80475 Medium PowerShell script block logging must be enabled on Windows 2012/2012 R2.
V-43238 Medium The display of slide shows on the lock screen must be disabled (Windows 2012 R2).
V-43239 Medium Windows 2012 R2 must include command line data in process creation events.
V-1072 Medium Shared user accounts must not be permitted on the system.
V-1070 Medium Server systems must be located in a controlled access area, accessible only to authorized personnel.
V-26576 Medium The IP-HTTPS IPv6 transition technology must be disabled.
V-26577 Medium The ISATAP IPv6 transition technology must be disabled.
V-26575 Medium The 6to4 IPv6 transition technology must be disabled.
V-26578 Medium The Teredo IPv6 transition technology must be disabled.
V-1171 Medium Ejection of removable NTFS media must be restricted to Administrators.
V-26478 Medium The Create a pagefile user right must only be assigned to the Administrators group.
V-26474 Medium The Back up files and directories user right must only be assigned to the Administrators group.
V-26473 Medium The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group.
V-26472 Medium The Allow log on locally user right must only be assigned to the Administrators group.
V-26470 Medium Unauthorized accounts must not have the Access this computer from the network user right on domain controllers.
V-36658 Medium Users with administrative privilege must be documented.
V-36656 Medium A screen saver must be enabled on the system.
V-36657 Medium The screen saver must be password protected.
V-15727 Medium Users must be prevented from sharing files in their profiles.
V-15722 Medium Windows Media Digital Rights Management (DRM) must be prevented from accessing the Internet.
V-1089 Medium The required legal notice must be configured to display before console logon.
V-3470 Medium The system must be configured to prevent unsolicited remote assistance offers.
V-3479 Medium The system must be configured to use Safe DLL Search Mode.
V-14243 Medium Administrator accounts must not be enumerated during elevation.
V-26582 Medium The System event log size must be configured to 32768 KB or greater.
V-26581 Medium The Setup event log size must be configured to 32768 KB or greater.
V-26580 Medium The Security event log size must be configured to 196608 KB or greater.
V-3376 Medium The system must be configured to prevent the storage of passwords and credentials.
V-3377 Medium The system must be configured to prevent anonymous users from having the same rights as the Everyone group.
V-3374 Medium The system must be configured to require a strong session key.
V-3378 Medium The system must be configured to use the Classic security model.
V-33666 Medium The system must be configured to audit DS Access - Directory Service Changes failures.
V-36724 Medium Permissions for the System event log must prevent access by nonprivileged accounts.
V-36722 Medium Permissions for the Application event log must prevent access by nonprivileged accounts.
V-36723 Medium Permissions for the Security event log must prevent access by nonprivileged accounts.
V-36720 Medium The Windows Remote Management (WinRM) service must not store RunAs credentials.
V-36684 Medium Local users on domain-joined computers must not be enumerated.
V-36687 Medium App notifications on the lock screen must be turned off.
V-36681 Medium Copying of user input methods to the system account for sign-in must be prevented.
V-36680 Medium Access to the Windows Store must be turned off.
V-15674 Medium The Internet File Association service must be turned off.
V-26538 Medium The system must be configured to audit Account Management - User Account Management failures.
V-26539 Medium The system must be configured to audit Detailed Tracking - Process Creation successes.
V-26533 Medium The system must be configured to audit Account Management - Other Account Management Events successes.
V-26530 Medium The system must be configured to audit Account Logon - Credential Validation failures.
V-26531 Medium Windows Server 2012/2012 R2 domain controllers must be configured to audit Account Management - Computer Account Management successes.
V-26537 Medium The system must be configured to audit Account Management - User Account Management successes.
V-26535 Medium The system must be configured to audit Account Management - Security Group Management successes.
V-43240 Medium The network selection user interface (UI) must not be displayed on the logon screen (Windows 2012 R2).
V-43245 Medium Automatically signing in the last interactive user after a system-initiated restart must be disabled (Windows 2012 R2).
V-26549 Medium The system must be configured to audit Privilege Use - Sensitive Privilege Use successes.
V-26548 Medium The system must be configured to audit Policy Change - Authentication Policy Change successes.
V-26547 Medium The system must be configured to audit Policy Change - Audit Policy Change failures.
V-26546 Medium The system must be configured to audit Policy Change - Audit Policy Change successes.
V-26543 Medium The system must be configured to audit Logon/Logoff - Special Logon successes.
V-26542 Medium The system must be configured to audit Logon/Logoff - Logon failures.
V-26541 Medium The system must be configured to audit Logon/Logoff - Logon successes.
V-26540 Medium The system must be configured to audit Logon/Logoff - Logoff successes.
V-36667 Medium The system must be configured to audit Object Access - Removable Storage failures.
V-36666 Medium Policy must require that system administrators (SAs) be trained for the operating systems used by systems under their control.
V-36662 Medium Windows 2012/2012 R2 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
V-36661 Medium Policy must require application account passwords be at least 15 characters in length.
V-57641 Medium Protection methods such as TLS, encrypted VPNs, or IPSEC must be implemented if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
V-8322 Medium Time synchronization must be enabled on the domain controller.
V-36668 Medium The system must be configured to audit Object Access - Removable Storage successes.
V-4448 Medium Group Policy objects must be reprocessed even if they have not changed.
V-73519 Medium The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.
V-3666 Medium The system must be configured to meet the minimum session security requirement for NTLM SSP-based servers.
V-14239 Medium User Account Control must only elevate UIAccess applications that are installed in secure locations.
V-14230 Medium Audit policy using subcategories must be enabled.
V-14234 Medium User Account Control approval mode for the built-in Administrator must be enabled.
V-14235 Medium User Account Control must, at minimum, prompt administrators for consent.
V-14236 Medium User Account Control must automatically deny standard user requests for elevation.
V-14237 Medium User Account Control must be configured to detect application installations and prompt for elevation.
V-39327 Medium The Active Directory Infrastructure object must be configured with proper audit settings.
V-39326 Medium The Active Directory Domain object must be configured with proper audit settings.
V-39325 Medium Active Directory Group Policy objects must be configured with proper audit settings.
V-75915 Medium Orphaned security identifiers (SIDs) must be removed from user rights on Windows 2012 / 2012 R2.
V-39329 Medium The Active Directory AdminSDHolder object must be configured with proper audit settings.
V-39328 Medium The Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
V-57645 Medium Systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
V-3245 Medium Non system-created file shares on a system must limit access to groups that require it.
V-40237 Medium The US DoD CCEB Interoperability Root CA cross-certificates must be installed into the Untrusted Certificates Store on unclassified systems.
V-36710 Low Automatic download of updates from the Windows Store must be turned off.
V-1165 Low The computer account password must not be prevented from being reset.
V-1090 Low Caching of logon credentials must be limited.
V-36696 Low The detection of compatibility issues for applications and drivers must be turned off.
V-36697 Low Trusted app installation must be enabled to allow for signed enterprise line of business apps.
V-1128 Low Security configuration tools or equivalent processes must be used to configure and maintain platforms for security compliance.
V-21963 Low Windows Update must be prevented from searching for point and print drivers.
V-21964 Low Device metadata retrieval from the Internet must be prevented.
V-21965 Low Device driver searches using Windows Update must be prevented.
V-21967 Low Microsoft Support Diagnostic Tool (MSDT) interactive communication with Microsoft must be prevented.
V-21960 Low Domain users must be required to elevate when setting a networks location.
V-21961 Low All Direct Access traffic must be routed through the internal network.
V-21969 Low Access to Windows Online Troubleshooting Service (WOTS) must be prevented.
V-28504 Low Windows must be prevented from sending an error report when a device driver requests additional software during installation.
V-15703 Low Users must not be prompted to search Windows Update for device drivers.
V-15702 Low An Error Report must not be sent when a generic device driver is installed.
V-15701 Low A system restore point must be created when a new device driver is installed.
V-15707 Low Remote Assistance log files must be generated.
V-36673 Low IP stateless autoconfiguration limits state must be enabled.
V-36678 Low Device driver updates must only search managed servers, not Windows Update.
V-14831 Low The directory service must be configured to terminate LDAP-based network connections to the directory server after five (5) minutes of inactivity.
V-36677 Low Optional component installation and component repair must be prevented from using Windows Update.
V-15704 Low Errors in handwriting recognition on tablet PCs must not be reported to Microsoft.
V-11806 Low The system must be configured to prevent the display of the last username on the logon screen.
V-1151 Low The print driver installation privilege must be restricted to administrators.
V-4438 Low The system must limit how many times unacknowledged TCP data is retransmitted.
V-1112 Low Outdated or unused accounts must be removed from the system or disabled.
V-21955 Low IPv6 source routing must be configured to the highest protection level.
V-21956 Low IPv6 TCP data retransmissions must be configured to prevent resources from becoming exhausted.
V-15718 Low Turning off File Explorer heap termination on corruption must be disabled.
V-8324 Low The time synchronization tool must be configured to enable logging of time source switching.
V-36733 Low User-level information must be backed up in accordance with local recovery time and recovery point objectives.
V-15686 Low Nonadministrators must be prevented from applying vendor-signed updates.
V-15687 Low Users must not be presented with Privacy and Installation options on first use of Windows Media Player.
V-40172 Low Backups of system-level information must be protected.
V-40173 Low System-related documentation must be backed up in accordance with local recovery time and recovery point objectives.
V-4113 Low The system must be configured to limit how often keep-alive packets are sent.
V-4108 Low The system must generate an audit event when the audit log reaches a percentage of full threshold.
V-36777 Low Toast notifications to the lock screen must be turned off.
V-36776 Low Notifications from Windows Push Network Service must be turned off.
V-4408 Low Domain controllers must be configured to allow reset of machine account passwords.
V-1076 Low System-level information must be backed up in accordance with local recovery time and recovery point objectives.
V-1075 Low The shutdown option must not be available from the logon dialog box.
V-1174 Low The amount of idle time required before suspending a session must be properly set.
V-1172 Low Users must be warned in advance of their passwords expiring.
V-1173 Low The default permissions of global system objects must be increased.
V-3472 Low The time service must synchronize with an appropriate DoD time source.
V-3373 Low The maximum age for machine account passwords must be set to requirements.
V-26359 Low The Windows dialog box title for the legal banner must be configured.
V-1136 Low Users must be forcibly disconnected when their logon hours expire.
V-1135 Low Nonadministrative user accounts or groups must only have print permissions on printer shares.
V-15672 Low Event Viewer Events.asp links must be turned off.
V-43241 Low The setting to allow Microsoft accounts to be optional for modern style apps must be enabled (Windows 2012 R2).
V-21971 Low The Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.
V-21970 Low Responsiveness events must be prevented from being aggregated and sent to Microsoft.
V-4445 Low Optional Subsystems must not be permitted to operate on the system.
V-4112 Low The system must be configured to disable the Internet Router Discovery Protocol (IRDP).
V-4111 Low The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.
V-4110 Low The system must be configured to prevent IP source routing.
V-4116 Low The system must be configured to ignore NetBIOS name release requests except from WINS servers.
V-4442 Low The system must be configured to have password protection take effect within a limited time frame when the screen saver becomes active.
V-14232 Low IPSec Exemptions must be limited.