DISA STIGS Viewer

Windows 10 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.

Overview

Finding ID Version Rule ID IA Controls Severity
V-268319 WN10-CC-000063 SV-268319r1028350_rule   Medium
Description
Without Windows 10 systems being managed, devices could be rogue and become targets of an attacker.
STIG Date
Microsoft Windows 10 Security Technical Implementation Guide 2024-11-25

Details

Check Text (C-72340r1028350_chk)
Verify the Windows 10 system is receiving policy from either Group Policy or an MDM with the following steps:

From a command line or PowerShell:

gpresult /R
OS Configuration: Member Workstation

If the system is not being managed by GPO, ask the administrator to indicate which MDM is managing the device.

If the Window 10 system is not receiving policy from either Group Policy or an MDM, this is a finding.
Fix Text (F-72243r1028256_fix)
Configure the Windows 10 system to use either Group Policy or an approved MDM product to enforce STIG compliance.