Puppet module which is able TRULY apply CIS rules. It can apply security templates and registry-based policy.
Hardening is made using CIS Benchmark for ALL Scored rules against Standalone Windows Server
class { 'windows_cis::rules':
ensure => 'present',
list => 'all',
}
This will apply basic scored CIS rules for Standalone Server Instance. Some additional rules also are defined in rules_list.txt
--
Based on CIS Microsoft Windows Server 2012 Benchmark
Set 'Account lockout threshold' to '5 invalid logon attempt(s)' (Scored)
Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy\Account lockout threshold
Set 'Account lockout duration' to '15 or more minute(s)' (Scored)
Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy\Account lockout duration
Set 'Reset account lockout counter after' to '15 minute(s)' (Scored)
Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy\Reset account lockout counter after
Set 'Minimum password length' to '14 or more character(s)' (Scored)
Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy\Minimum password length
Set 'Enforce password history' to '24 or more password(s)' (Scored)
Computer Configuration\Windows Settings\Security Settings\Account Policies\Password
Policy\Enforce password history
Set 'Password must meet complexity requirements' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Account Policies\Password
Policy\Password must meet complexity requirements
Set 'Store passwords using reversible encryption' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Account Policies\Password
Policy\Store passwords using reversible encryption
Set 'Minimum password age' to '1 or more day(s)' (Scored)
Computer Configuration\Windows Settings\Security Settings\Account Policies\Password
Policy\Minimum password age
et 'Maximum password age' to '60 or fewer days' (Scored)
Computer Configuration\Windows Settings\Security Settings\Account Policies\Password
Policy\Maximum password age
Set 'Audit Policy: Account Logon: Credential Validation' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Account Logon\Audit Policy: Account Logon: Credential Validation
Set 'Audit Policy: Account Logon: Kerberos Authentication Service' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Account Logon\Audit Policy: Account Logon: Kerberos Authentication Service
Set 'Audit Policy: Account Logon: Kerberos Service Ticket Operations' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Account Logon\Audit Policy: Account Logon: Kerberos Service Ticket Operations
Set 'Audit Policy: Account Logon: Other Account Logon Events' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Account Logon\Audit Policy: Account Logon: Other Account Logon Events
Set 'Audit Policy: Account Management: Application Group Management' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Account Management\Audit Policy: Account Management: Application Group Management
Configure 'Audit Policy: Account Management: Computer Account Management' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Account Management\Audit Policy: Account Management: Computer Account Management
Set 'Audit Policy: Account Management: Distribution Group Management' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Account Management\Audit Policy: Account Management: Distribution Group Management
Set 'Audit Policy: Account Management: Other Account Management Events' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Account Management\Audit Policy: Account Management: Other Account Management Events
Set 'Audit Policy: Account Management: Security Group Management' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Account Management\Audit Policy: Account Management: Security Group Management
Set 'Audit Policy: Account Management: User Account Management' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Account Management\Audit Policy: Account Management: User Account Management
Set 'Audit Policy: Detailed Tracking: DPAPI Activity' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Detailed Tracking\Audit Policy: Detailed Tracking: DPAPI Activity
Set 'Audit Policy: Detailed Tracking: Process Creation' to 'Success' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Detailed Tracking\Audit Policy: Detailed Tracking: Process Creation
Set 'Audit Policy: Detailed Tracking: Process Termination' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Detailed Tracking\Audit Policy: Detailed Tracking: Process Termination
Set 'Audit Policy: Detailed Tracking: RPC Events' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Detailed Tracking\Audit Policy: Detailed Tracking: RPC Events
Set 'Audit Policy: DS Access: Detailed Directory Service Replication' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\DS Access\Audit Policy: DS Access: Detailed Directory Service Replication
Set 'Audit Policy: DS Access: Directory Service Access' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\DS Access\Audit Policy: DS Access: Directory Service Access
Set 'Audit Policy: DS Access: Directory Service Changes' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\DS Access\Audit Policy: DS Access: Directory Service Changes
Set 'Audit Policy: DS Access: Directory Service Replication' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\DS Access\Audit Policy: DS Access: Directory Service Replication
Set 'Audit Policy: Logon-Logoff: Account Lockout' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Account Lockout
Set 'Audit Policy: Logon-Logoff: IPsec Extended Mode' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: IPsec Extended Mode
Set 'Audit Policy: Logon-Logoff: IPsec Main Mode' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: IPsec Main Mode
Set 'Audit Policy: Logon-Logoff: IPsec Quick Mode' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: IPsec Quick Mode
Set 'Audit Policy: Logon-Logoff: Logoff' to 'Success' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Logoff
Set 'Audit Policy: Logon-Logoff: Logon' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Logon
Set 'Audit Policy: Logon-Logoff: Network Policy Server' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Network Policy Server
Set 'Audit Policy: Logon-Logoff: Other Logon/Logoff Events' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Other Logon/Logoff Events
Set 'Audit Policy: Logon-Logoff: Special Logon' to 'Success' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Special Logon
Set 'Audit Policy: Object Access: Application Generated' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Application Generated
Set 'Audit Policy: Object Access: Central Access Policy Staging' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Central Access Policy Staging
Set 'Audit Policy: Object Access: Certification Services' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Certification Services
Set 'Audit Policy: Object Access: Detailed File Share' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Detailed File Share
Set 'Audit Policy: Object Access: File Share' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: File Share
Set 'Audit Policy: Object Access: File System' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: File System
Set 'Audit Policy: Object Access: Filtering Platform Connection' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Filtering Platform Connection
Set 'Audit Policy: Object Access: Filtering Platform Packet Drop' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Filtering Platform Packet Drop
Set 'Audit Policy: Object Access: Handle Manipulation' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Handle Manipulation
Set 'Audit Policy: Object Access: Kernel Object' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Kernel Object
Set 'Audit Policy: Object Access: Other Object Access Events' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Other Object Access Events
Set 'Audit Policy: Object Access: Registry' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Registry
Set 'Audit Policy: Object Access: Removable Storage' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Removable Storage
Set 'Audit Policy: Object Access: SAM' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Object Access\Audit Policy: Object Access: SAM
Set 'Audit Policy: Policy Change: Audit Policy Change' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Policy Change\Audit Policy: Policy Change: Audit Policy Change
Set 'Audit Policy: Policy Change: Authentication Policy Change' to 'Success' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Policy Change\Audit Policy: Policy Change: Authentication Policy Change
Set 'Audit Policy: Policy Change: Authorization Policy Change' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Policy Change\Audit Policy: Policy Change: Authorization Policy Change
Set 'Audit Policy: Policy Change: Filtering Platform Policy Change' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Policy Change\Audit Policy: Policy Change: Filtering Platform Policy Change
Set 'Audit Policy: Policy Change: MPSSVC Rule-Level Policy Change' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Policy Change\Audit Policy: Policy Change: MPSSVC Rule- Level Policy Change
Set 'Audit Policy: Policy Change: Other Policy Change Events' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Policy Change\Audit Policy: Policy Change: Other Policy Change Events
Set 'Audit Policy: Privilege Use: Non Sensitive Privilege Use' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Privilege Use\Audit Policy: Privilege Use: Non Sensitive Privilege Use
Set 'Audit Policy: Privilege Use: Other Privilege Use Events' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Privilege Use\Audit Policy: Privilege Use: Other Privilege Use Events
Set 'Audit Policy: Privilege Use: Sensitive Privilege Use' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\Privilege Use\Audit Policy: Privilege Use: Sensitive Privilege Use
Set 'Audit Policy: System: IPsec Driver' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\System\Audit Policy: System: IPsec Driver
Set 'Audit Policy: System: Other System Events' to 'No Auditing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\System\Audit Policy: System: Other System Events
Set 'Audit Policy: System: Security State Change' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\System\Audit Policy: System: Security State Change
Set 'Audit Policy: System: Security System Extension' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\System\Audit Policy: System: Security System Extension
Set 'Audit Policy: System: System Integrity' to 'Success and Failure' (Scored)
Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy
Configuration\Audit Policies\System\Audit Policy: System: System Integrity
Configure 'Accounts: Rename administrator account' (Scored)
Default Value: Administrator
Configure 'Accounts: Rename guest account' (Scored)
Default Value: Guest
Set 'Accounts: Limit local account use of blank passwords to console logon only' to 'Enabled' (Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\LimitBlankPasswordUse
Configure 'Audit: Audit the access of global system objects' (Not Scored)
Default Value: Disabled
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\AuditBaseObjects
Configure 'Audit: Audit the use of Backup and Restore privilege' (Not Scored)
Default Value: Disabled
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\fullprivilegeauditing
Set 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings
Set 'Audit: Shut down system immediately if unable to log security audits' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Audit: Shut down system immediately if unable to log security audits
Configure 'DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax' (Not Scored)
HKEY_LOCAL_MACHINE\Software\policies\Microsoft\windows NT\DCOM\MachineAccessRestriction
Configure 'DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax' (Not Scored)
HKEY_LOCAL_MACHINE\Software\policies\Microsoft\windows NT\DCOM\MachineLaunchRestriction
Configure 'Devices: Allow undock without having to log on' (Not Scored)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\undockwithoutlogon
Configure 'Devices: Restrict CD-ROM access to locally logged- on user only' (Not Scored)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\AllocateCDRoms
Configure 'Devices: Restrict floppy access to locally logged-on user only' (Not Scored)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\AllocateFloppies
Set 'Devices: Allowed to format and eject removable media' to 'Administrators' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Devices: Allowed to format and eject removable media
Set 'Devices: Prevent users from installing printer drivers' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Devices: Prevent users from installing printer drivers
Set 'Domain controller: Allow server operators to schedule tasks' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain controller: Allow server operators to schedule tasks
Set 'Domain controller: LDAP server signing requirements' to 'Require signing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain controller: LDAP server signing requirements
Set 'Domain controller: Refuse machine account password changes' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain controller: Refuse machine account password changes
Set 'Domain member: Digitally encrypt or sign secure channel data (always)' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Domain member: Digitally encrypt or sign secure channel data (always)
Set 'Domain member: Digitally encrypt secure channel data (when possible)' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Domain member: Digitally encrypt secure channel data (when possible)
Set 'Domain member: Digitally sign secure channel data (when possible)' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Digitally sign secure channel data (when possible)
Set 'Domain member: Disable machine account password changes' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Domain member: Disable machine account password changes
Set 'Domain member: Maximum machine account password age' to '30 or fewer day(s)' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Maximum machine account password age
Set 'Domain member: Require strong (Windows 2000 or later) session key' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Require strong (Windows 2000 or later) session key
Configure 'Interactive logon: Display user information when the session is locked' (Not Scored)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\DontDispl
ayLockedUserId
Configure 'Interactive logon: Message text for users attempting to log on' (Scored)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\LegalNoti
ceText
Configure 'Interactive logon: Message title for users attempting to log on' (Scored)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\LegalNoti
ceCaption
Configure 'Interactive logon: Require smart card' (Not Scored)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\scforceop
tion
Set 'Interactive logon: Do not display last user name' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Interactive logon: Do not display last user name
Set 'Interactive logon: Do not require CTRL+ALT+DEL' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Interactive logon: Do not require CTRL+ALT+DEL
Set 'Interactive logon: Machine inactivity limit' to '900 or fewer seconds' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Interactive logon: Machine inactivity limit
Set 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' to '4 or fewer logon(s)' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Interactive logon: Number of previous logons to cache (in case domain controller is not available)
Set 'Interactive logon: Prompt user to change password before expiration' to '14 or more day(s)' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Interactive logon: Prompt user to change password before expiration
Set 'Interactive logon: Require Domain Controller authentication to unlock workstation' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Interactive logon: Require Domain Controller authentication to unlock workstation
Set 'Interactive logon: Smart card removal behavior' to 'Lock Workstation' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Interactive logon: Smart card removal behavior
Set 'Interactive logon: Machine account lockout threshold' to 10 or fewer invalid logon attempts (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Interactive logon: Machine account lockout threshold
Set 'Microsoft network client: Digitally sign communications (always)' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Microsoft network client: Digitally sign communications (always)
Set 'Microsoft network client: Digitally sign communications (if server agrees)' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Microsoft network client: Digitally sign communications (if server agrees)
Set 'Microsoft network client: Send unencrypted password to third-party SMB servers' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Microsoft network client: Send unencrypted password to third-party SMB servers
Configure 'Microsoft network server: Server SPN target name validation level' (Not Scored)'
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\SMBServer
NameHardeningLevel
Set 'Microsoft network server: Amount of idle time required before suspending session' to '15 or fewer minute(s)' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Microsoft network server: Amount of idle time required before suspending session
Set 'Microsoft network server: Digitally sign communications (always)' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Microsoft network server: Digitally sign communications (always)
Set 'Microsoft network server: Digitally sign communications (if client agrees)' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Microsoft network server: Digitally sign communications (if client agrees)
Set 'Microsoft network server: Disconnect clients when logon hours expire' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Microsoft network server: Disconnect clients when logon hours expire
Configure 'MSS: (AutoReboot) Allow Windows to automatically restart after a system crash (recommended except for highly secure environments)' (Not Scored)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl\AutoReboot
Configure 'MSS: (AutoShareServer) Enable Administrative Shares (recommended except for highly secure environments)' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters\AutoShare
Server
Configure 'MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\EnableICMPRedirect
Configure 'MSS: (Hidden) Hide Computer From the Browse List (not recommended except for highly secure environments)' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Lanmanserver\Parameters\Hidden
Configure 'MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\KeepAliveTime
Configure 'MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic.' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\IPSEC\NoDefaultExempt
Configure 'MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netbt\Parameters\NoNameReleaseOnD
emand
Configure 'MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS)' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\PerformRouterDis
covery
Configure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip6\Parameters\TcpMaxDataRetra
nsmissions
Configure 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\TcpMaxDataRetran
smissions
Set 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)
Set 'MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)' to 'Highest protection, source routing is completely disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)
Set 'MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)' to 'Highest protection, source routing is completely disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)
Set 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)
Set 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)' to '0' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)
Set 'MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning' to '0.9 or less' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning
Configure 'Network access: Do not allow storage of passwords and credentials for network authentication' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\DisableDomainCreds
Configure 'Network access: Named Pipes that can be accessed anonymously' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\NullSessi
onPipes
Configure 'Network access: Shares that can be accessed anonymously' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\NullSessi
onShares
Set 'Network access: Allow anonymous SID/Name translation' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Network access: Allow anonymous SID/Name translation
Set 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Network access: Do not allow anonymous enumeration of SAM accounts and shares
Set 'Network access: Do not allow anonymous enumeration of SAM accounts' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Network access: Do not allow anonymous enumeration of SAM accounts
Set 'Network access: Let Everyone permissions apply to anonymous users' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Network access: Let Everyone permissions apply to anonymous users
CCE-25426-8131. Set 'Network access: Remotely accessible registry paths and sub-paths' to 'System\CurrentControlSet\Control\Print\Printers System\CurrentControlSet\Services\Eventlog icrosoft\OLAP Server Software\Microsoft\Windows NT\CurrentVersion\Print Softwar (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Remotely accessible registry paths and sub-paths
Set to: System\CurrentControlSet\Control\Print\Printers System\CurrentControlSet\Services\Eventlog Software\Microsoft\OLAP Server Software\Microsoft\Windows NT\CurrentVersion\Print Software\Microsoft\Windows NT\CurrentVersion\Windows System\CurrentControlSet\Control\ContentIndex System\CurrentControlSet\Control\Terminal Server System\CurrentControlSet\Control\Terminal Server\UserConfig System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration Software\Microsoft\Windows NT\CurrentVersion\Prefab System\CurrentControlSet\Services\SysmonLog
CCE-23899-8132. Set 'Network access: Remotely accessible registry paths' to 'System\CurrentControlSet\Control\ProductOptions System\CurrentControlSet\Control\Server Applications icrosoft\Windows NT\CurrentVersion' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Remotely accessible registry paths
Set to: System\CurrentControlSet\Control\ProductOptions System\CurrentControlSet\Control\Server Applications Software\Microsoft\Windows NT\CurrentVersion
Set 'Network access: Restrict anonymous access to Named Pipes and Shares' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Network access: Restrict anonymous access to Named Pipes and Shares
Set 'Network access: Sharing and security model for local accounts' to 'Classic - local users authenticate as themselves' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Network access: Sharing and security model for local accounts
Configure 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\pku2u\AllowOnlineID
Configure 'Network Security: Configure encryption types allowed for Kerberos' (Not Scored)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\
Parameters\SupportedEncryptionTypes
Configure 'Network security: Force logoff when logon hours expire' (Not Scored)
WHAT??!
Configure 'Network Security: Restrict NTLM: Add remote server exceptions for NTLM authentication' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\MSV1_0\ClientAllowedNTLMServers
Configure 'Network Security: Restrict NTLM: Add server exceptions in this domain' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\DCAllowedNTLM Servers
Configure 'Network Security: Restrict NTLM: Audit Incoming NTLM Traffic' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\MSV1_0\AuditReceivingNTLMTraffic
Configure 'Network Security: Restrict NTLM: Audit NTLM authentication in this domain' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\AuditNTLMInDomain
Configure 'Network Security: Restrict NTLM: Incoming NTLM traffic' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\MSV1_0\RestrictReceivingNTLMTraffic
Configure 'Network Security: Restrict NTLM: NTLM authentication in this domain' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\RestrictNTLMInDomain
Configure 'Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\MSV1_0\RestrictSendingNTLMTraffic
Set 'Network security: Allow Local System to use computer identity for NTLM' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\SecurityOptions\Network security: Allow Local System to use computer identity for NTLM
Set 'Network security: Allow LocalSystem NULL session fallback' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\SecurityOptions\Network security: Allow LocalSystem NULL session fallback
Set 'Network security: Do not store LAN Manager hash value on next password change' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\SecurityOptions\Network security: Do not store LAN Manager hash value on next password change
Set 'Network security: LAN Manager authentication level' to 'Send NTLMv2 response only. Refuse LM & NTLM' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\SecurityOptions\Network security: LAN Manager authentication level
Set 'Network security: LDAP client signing requirements' to 'Negotiate signing' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\SecurityOptions\Network security: LDAP client signing requirements
Set 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' to 'Require NTLMv2 session security,Require 128-bit encryption' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\SecurityOptions\Network security: Minimum session security for NTLM SSP based (including secure RPC) client
Set 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' to 'Require NTLMv2 session security,Require 128-bit encryption' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
Set 'Recovery console: Allow automatic administrative logon' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\SecurityOptions\Recovery console: Allow automatic administrative logon
Set 'Recovery console: Allow floppy copy and access to all drives and all folders' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Recovery console: Allow floppy copy and access to all drives and all folders
Set 'Shutdown: Allow system to be shut down without having to log on' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Shutdown: Allow system to be shut down without having to log on
Set 'Shutdown: Clear virtual memory pagefile' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Shutdown: Clear virtual memory pagefile
Configure 'System cryptography: Force strong key protection for user keys stored on the computer' (Not Scored)
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Cryptography\ForceKeyProtection
Set 'System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
Set 'System objects: Require case insensitivity for non- Windows subsystems' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\SecurityOptions\System objects: Require case insensitivity for non-Windows subsystems
Set 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)
Configure 'System settings: Optional subsystems' (Not Scored)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\SubSystems\optional
Set 'System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies
Set 'User Account Control: Admin Approval Mode for the Built-in Administrator account' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Admin Approval Mode for the Built-in Administrator account
Set 'User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
Set 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' to 'Prompt for consent for non-Windows binaries' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Behaviour of the elevation prompt for administrators in Admin Approval Mode
Set 'User Account Control: Behavior of the elevation prompt for standard users' to 'Prompt for credentials' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Behavior of the elevation prompt for standard users
Set 'User Account Control: Detect application installations and prompt for elevation' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Detect application installations and prompt for
elevation
Set 'User Account Control: Only elevate executables that are signed and validated' to 'Disabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Only elevate executables that are signed and validated
Set 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Only elevate UIAccess applications that are installed in
secure locations
Set 'User Account Control: Run all administrators in Admin Approval Mode' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Run all administrators in Admin Approval Mode
Set 'User Account Control: Switch to the secure desktop when prompting for elevation' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Switch to the secure desktop when prompting for elevation
Set 'User Account Control: Virtualize file and registry write failures to per-user locations' to 'Enabled' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Virtualize file and registry write failures to per-user locations
Configure 'Deny log on through Remote Desktop Services' (Not Scored)
Optional
Configure 'Log on as a service' (Not Scored)
Optional
Set 'Access Credential Manager as a trusted caller' to 'No One' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Access Credential Manager as a trusted caller
Configure 'Access this computer from the network' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Access this computer from the network
The recommended state for this setting is: - Administrators, Authenticated Users
Set 'Act as part of the operating system' to 'No One' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Act as part of the operating system
Set 'Add workstations to domain' to 'Administrators' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Add workstations to domain
Set 'Adjust memory quotas for a process' to 'Administrators, Local Service, Network Service' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Adjust memory quotas for a process
Set 'Allow log on locally' to 'Administrators' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on locally
Set 'Allow log on through Remote Desktop Services' to 'Administrators' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on through Remote Desktop Services
Set 'Back up files and directories' to 'Administrators' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Back up files and directories
Configure 'Bypass traverse checking' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights
Assignment\Bypass traverse checking
The recommended state for this setting is: - Administrators, Authenticated Users, Backup Operators, Local Service, Network Service.
Set 'Change the system time' to 'LOCAL SERVICE, Administrators' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Change the system time
Set the following Group Policy setting to: - LOCAL SERVICE, Administrators.
Set 'Change the time zone' to 'LOCAL SERVICE, Administrators' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Change the time zone
Set the following Group Policy setting to: - LOCAL SERVICE, Administrators.
Set 'Create a pagefile' to 'Administrators' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create a pagefile
Set 'Create a token object' to 'No One' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create a token object
Set 'Create global objects' to 'Administrators, SERVICE, LOCAL SERVICE, NETWORK SERVICE' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create global objects
Set 'Create permanent shared objects' to 'No One' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create permanent shared objects
Set 'Create symbolic links' to 'Administrators' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create symbolic links
Set 'Debug programs' to 'Administrators' (Scored)
Windows Product Updates may stop responding or may use most or all the CPU resources, in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?LinkId=100747).
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Debug programs
Set 'Deny access to this computer from the network' to 'Guests' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny access to this computer from the network
Set 'Deny log on as a batch job' to 'Guests' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on as a batch job
Set 'Deny log on as a service' to 'No One' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on as a service
Set 'Deny log on locally' to 'Guests' (Scored)
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on locally
Windows only ofc