Introduction
Purpose
Security is complex and constantly changing. This standard was written to provide a minimum standard for the baseline of Window Server Security and to help Administrators avoid some of the common configuration flaws that could leave systems more exposed.
Guideline
This hardening standard, in part, is taken from the guidance of the Center for Internet Security and is the result of a consensus baseline of security guidance from several government and commercial bodies. Other recommendations were taken from the Windows Security Guide, and the Threats and Counter Measures Guide developed by Microsoft.
Baseline Security Settings
Account Policies
1.1 | Account Policies | Setting |
---|---|---|
1.1.1 | Enforce password | 24 remembered; not required to set for local accounts |
1.1.2 | Maximum password age | 90 days (maximum) |
1.1.3 | Minimum password age | 1 day or more |
1.1.4 | Minimum password length | 8 characters |
1.1.5 | Password must meet complexity requirements | Enabled |
1.1.6 | Store passwords using reversible encryption | Disabled |
1.1.7 | Account lockout duration | 15 minutes (minimum) |
1.1.8 | Account lockout threshold | 10 attempts |
1.1.9 | Reset account lockout counter after | 15 minutes (minimum) |
1.1.10 | Enforce user logon restrictions | Enabled |
1.1.11 | Maximum tolerance for computer clock synchronization | 5 |
1.1.12 | Maximum lifetime for service ticket | 600 |
1.1.13 | Maximum lifetime for user ticket renewal | 7 days |
1.1.14 | Maximum lifetime for user ticket | 10 |
Audit Policies
Windows Server 2008 has detailed audit facilities that allow administrators to tune their audit policy with greater specificity. By enabling the legacy audit facilities outlined in this section, it is probable that the performance of the system may be reduced and that the security event log will realize high event volumes. Given this, it is recommended that Detailed Audit Policies in the subsequent section be leveraged in favor over the policies represented below. Additionally, the "Force audit policy subcategory settings", which is recommended to be enabled, causes Windows to favor the audit subcategories over the legacy audit policies. For the above reasons, this Benchmark does not prescribe specific values for legacy audit policies.
1.2 | Audit Policy | Setting |
---|---|---|
1.2.1 | Audit Account Logon Events | Success and Failure |
1.2.2 | Audit Account Management | Success and Failure |
1.2.3 | Audit Directory Service Access | No Auditing |
1.2.4 | Audit Logon Events | Success and Failure |
1.2.5 | Audit Object Access | Failure (minimum) |
1.2.6 | Audit Policy Change | Success (minimum) |
1.2.7 | Audit Privilege Use | Failure (minimum) |
1.2.8 | Audit Process Tracking | No Audit |
1.2.9 | Audit System Events | Success (minimum) |
1.2.10 | Audit: Shut down system immediately if unable to log security audits | Disabled |
1.2.11 | Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings | Enabled |
Detailed Security Auditing
This section articulates the detailed audit policies introduced in Windows Vista and later. Prior to Windows Server 2008 R2, these settings could only be established via the auditpol.exe utility. However, in Server 2008 R2, GPOs exist for managing these items. Guidance is provided for establishing the recommended state using via GPO and auditpol.exe. The values prescribed in this section represent the minimum recommended level of auditing.
1.3 | Detailed Security Auditing | Setting |
---|---|---|
1.3.1 | Audit Policy: System: IPsec Driver | Success and Failure |
1.3.2 | Audit Policy: System: Security State Change | Success and Failure |
1.3.3 | Audit Policy: System: Security System Extension | Success and Failure |
1.3.4 | Audit Policy: System: System Integrity | Success and Failure |
1.3.5 | Audit Policy: Logon-Logoff: Logoff | Success |
1.3.6 | Audit Policy: Logon-Logoff: Logon | Success and Failure |
1.3.7 | Audit Policy: Logon-Logoff: Special Logon | Success |
1.3.8 | Audit Policy: Object Access: File System | Failure |
1.3.9 | Audit Policy: Object Access: Registry | Failure |
1.3.10 | Audit Policy: Privilege Use: Sensitive Privilege Use | No auditing |
1.3.11 | Audit Policy: Detailed Tracking: Process Creation | Success |
1.3.12 | Audit Policy: Policy Change: Audit Policy Change | Success and Failure |
1.3 | Detailed Security Auditing | Setting |
---|---|---|
1.3.13 | Audit Policy: Policy Change: Authentication Policy Change | Success |
1.3.14 | Audit Policy: Account Management: Computer Account Management | Success and Failure |
1.3.15 | Audit Policy: Account Management: Other Account Management Events | Success and Failure |
1.3.16 | Audit Policy: Account Management: Security Group Management | Success and Failure |
1.3.17 | Audit Policy: Account Management: User Account Management | Success and Failure |
1.3.18 | Audit Policy: DS Access: Directory Service Access | No Auditing |
1.3.19 | Audit Policy: DS Access: Directory Service Changes | No Auditing |
1.3.20 | Audit Policy: Account Logon: Credential Validation | Success and Failure |
Event Log
1.4 | Event Log | Setting |
---|---|---|
1.4.1 | Application: Maximum Log Size (KB) | 32768 KB or greater |
1.4.2 | Application: Retain old events | Disabled |
1.4.3 | Security: Maximum Log Size (KB) | 81920 KB or greater |
1.4.4 | Security: Retain old events | Disabled |
1.4.5 | System: Maximum Log Size (KB) | 32768 KB or greater |
1.4.6 | System: Retain old events | Disabled |
Windows Firewall
1.5 | Windows Firewall | Setting |
---|---|---|
1.5.1 | Windows Firewall: Allow ICMP exceptions (Domain) | Disabled |
1.5.2 | Windows Firewall: Allow ICMP exceptions (Standard) | Disabled |
1.5.3 | Windows Firewall: Apply local connection security rules (Domain) | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Configured. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is No. |
1.5.4 | Windows Firewall: Apply local connection security rules (Private) | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Configured. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is No. |
1.5.5 | Windows Firewall: Apply local connection security rules (Public) | No |
1.5.6 | Windows Firewall: Apply local firewall rules (Domain) | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Configured. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is No. |
1.5.7 | Windows Firewall: Apply local firewall rules (Private) | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Configured. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is No. |
1.5.8 | Windows Firewall: Apply local firewall rules (Public) | No |
1.5.9 | Windows Firewall: Display a notification (Domain) | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Yes. |
1.5.10 | Windows Firewall: Display a notification (Private) | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Yes. |
1.5.11 | Windows Firewall: Display a notification (Public) | No |
1.5.12 | Windows Firewall: Firewall state (Domain) | On |
1.5.13 | Windows Firewall: Firewall state (Private) | On |
1.5.14 | Windows Firewall: Firewall state (Public) | On |
1.5.15 | Windows Firewall: Inbound connections (Domain) | Block |
1.5.16 | Windows Firewall: Inbound connections (Private) | Block |
1.5.17 | Windows Firewall: Inbound connections (Public) | Block |
1.5.18 | Windows Firewall: Prohibit notifications (Domain) | Disabled |
1.5.19 | Windows Firewall: Prohibit notifications (Standard) | Disabled |
1.5.20 | Windows Firewall: Protect all network connections (Domain) | Enabled |
1.5.21 | Windows Firewall: Protect all network connections (Standard) | Enabled |
Windows Update
This Section contains recommended setting for University resources not administered by UITS – SSG; if resource is administered by UITS-SSG, Configuration Management Services will adjust these settings.
1.6 | Windows Update | Setting |
---|---|---|
1.6.1 | Configure Automatic Updates | Enabled: 3 - Auto download and notify for install |
1.6.2 | Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box | Disabled |
1.6.3 | Reschedule Automatic Updates scheduled installations | Enabled |
User Rights
1.8 | User Rights | Setting |
---|---|---|
1.8.1 | Access this computer from the network | For the Enterprise Member Server and SSLF Member Server profile(s), the recommended value is Administrators, Authenticated Users. For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the recommended value is Administrators, Authenticated Users, ENTERPRISE DOMAIN CONTROLLERS. |
1.8.2 | Act as part of the operating system | No one |
1.8.3 | Adjust memory quotas for a process | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators, LOCAL SERVICE, NETWORK SERVICE. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.4 | Back up files and directories | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.5 | Bypass traverse checking | For the Enterprise Member Server profile(s), the recommended value is Administrators, Authenticated Users, Backup Operators, Local Service, Network Service. For the Enterprise Domain Controller profile(s), the recommended value is Not Defined. For the SSLF Domain Controller profile(s), the recommended value is Authenticated Users, Local Service, Network Service. For the SSLF Member Server profile(s), the recommended value is Administrators, Authenticated Users, Local Service, Network Service. |
1.8.6 | Change the system time | LOCAL SERVICE, Administrators |
1.8.7 | Create a pagefile | For the Enterprise Member Server, SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators. For the Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.8 | Create a token object | No One |
1.8.9 | Create global objects | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators, SERVICE, Local Service, Network Service. |
1.8.10 | Create permanent shared objects | No One |
1.8.11 | Debug programs | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Administrators. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is No one. |
1.8.12 | Deny access to this computer from the network | Guests |
1.8.13 | Enable computer and user accounts to be trusted for delegation | No One |
1.8.14 | Force shutdown from a remote system | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.15 | Impersonate a client after | For all profiles, the recommended state for this setting is Administrators, SERVICE, Local Service, Network Service. |
1.8.16 | Increase scheduling priority | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.17 | Load and unload device drivers | Administrators |
1.8.18 | Lock pages in memory | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is No one. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.19 | Manage auditing and security log | For the Enterprise Member Server, SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators. For the Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.20 | Modify firmware environment values | For the Enterprise Member Server, SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators. For the Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.21 | Perform volume maintenance tasks | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.22 | Profile single process | Administrators |
1.8.23 | Profile system performance | Administrators |
1.8.24 | Remove computer from docking station | Administrators |
1.8.25 | Replace a process level token | For all profiles, the recommended state for this setting is LOCAL SERVICE, NETWORK SERVICE. |
1.8.26 | Shut down the system | Administrators |
1.8.27 | Add workstations to domain | For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the recommended value is Administrators. For the Enterprise Member Server and SSLF Member Server profile(s), the recommended value is Not Defined. |
1.8.28 | Allow log on locally | Administrators |
1.8.29 | Allow log on through Terminal Services | Do not disable; Limit via FW - Access via UConn networks only |
1.8.30 | Change the time zone | For all profiles, the recommended state for this setting is LOCAL SERVICE, Administrators. |
1.8.31 | Create symbolic links | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.32 | Deny log on locally | Guests |
1.8.33 | Deny log on through Terminal Services | Guests |
1.8.34 | Generate security audits | For the Enterprise Member Server, SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is LOCAL SERVICE, NETWORK SERVICE.For the Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.35 | Increase a process working set | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators, Local Service.For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.8.36 | Log on as a batch job | For the Enterprise Domain Controller,SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is No one.For the Enterprise Member Server profile(s), the recommended value is Not Defined. |
1.8.37 | Restore files and directories | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Administrators.For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Administrators, Backup Operators. |
1.8.38 | Take ownership of files or other objects | Administrators |
1.8.39 | Access credential Manager as a trusted caller | No One |
1.8.40 | Synchronize directory service data | No One |
Security Options
1.9 | Security Options | Setting |
---|---|---|
1.9.1 | Network security: Minimum session security for NTLM SSP based (including secure RPC) servers | For all profiles, the recommended state for this setting is Require NTLMv2 session security, Require 128-bit encryption. |
1.9.2 | Network access: Remotely accessible registry paths and sub-paths | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is: System\CurrentControlSet\Control\Print\Printers System\CurrentControlSet\Services\Eventlog Software\Microsoft\OLAP Server Software\Microsoft\Windows NT\CurrentVersion\Print Software\Microsoft\Windows NT\CurrentVersion\Windows System\CurrentControlSet\Control\ContentIndex System\CurrentControlSet\Control\Terminal Server System\CurrentControlSet\Control\Terminal Server\UserConfig System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration Software\Microsoft\Windows NT\CurrentVersion\Perflib System\CurrentControlSet\Services\SysmonLog Other Domain Controller profile(s), are Not Defined. |
1.9.3 | Accounts: Rename administrator account | For all profiles, the recommended state for this setting is any value that does not contain the term "admin". |
1.9.4 | Accounts: Rename guest account | For all profiles, the recommended state for this setting is any value that does not contain the term "guest". |
1.9.5 | Accounts: Guest account status | Disabled |
1.9.6 | Network access: Allow anonymous SID/Name translation | Disabled |
1.9.7 | Accounts: Limit local account use of blank passwords to console logon only | Enabled |
1.9.8 | Devices: Allowed to format and eject removable media | Administrators |
1.9.9 | Devices: Prevent users from installing printer drivers | Enabled |
1.9.10 | Devices: Restrict CD-ROM access to locally logged-on user only | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.9.11 | Devices: Restrict floppy access to locally logged-on user only | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled.For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.9.12 | Domain member: Digitally encrypt or sign secure channel data (always) | Enabled |
1.9.13 | Domain member: Digitally encrypt secure channel data (when possible) | Enabled |
1.9.14 | Domain member: Digitally sign secure channel data (when possible) | Enabled |
1.9.15 | Domain member: Disable machine account password changes | Disabled |
1.9.16 | Domain member: Maximum machine account password age | For all profiles, the recommended state for this setting is 30 day(s). |
1.9.17 | Domain member: Require strong (Windows 2000 or later) session key | Enabled |
1.9.18 | Domain controller: Allow server operators to schedule tasks | For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the recommended value is Disabled. For the Enterprise Member Server and SSLF Member Server profile(s), the recommended value is Not Defined. |
1.9.19 | Domain controller: LDAP server signing requirements | For the SSLF Domain Controller profile(s), the recommended value is Require signing. For the Enterprise Member Server, Enterprise Domain Controller and SSLF Member Server profile(s), the recommended value is Not Defined. |
1.9.20 | Domain controller: Refuse machine account password changes | For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the recommended value is Disabled. For the Enterprise Member Server and SSLF Member Server profile(s), the recommended value is Not Defined. |
1.9.21 | Interactive logon: Do not display last user name | Enabled |
1.9.22 | Interactive logon: Do not require CTRL+ALT+DEL | Disabled |
1.9.23 | Interactive logon: Number of previous logons to cache (in case domain controller is not available) | For all profiles, the recommended state for this setting is 1 logon. |
1.9.24 | Interactive logon: Prompt user to change password before expiration | 14 days (see netid.uconn.edu) |
1.9.25 | Interactive logon: Require Domain Controller authentication to unlock workstation | Enabled |
1.9.26 | Interactive logon: Smart card removal behavior | Lock Workstation |
1.9.27 | Omitted | |
1.9.28 | Omitted | |
1.9.29 | Interactive logon: Require smart card | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.9.30 | Microsoft network client: Digitally sign communications (always) | Enabled |
1.9.31 | Microsoft network client: Digitally sign communications (if server agrees) | Enabled |
1.9.32 | Microsoft network client: Send unencrypted password to third-party SMB servers | Disabled |
1.9.33 | Microsoft network server: Amount of idle time required before suspending session | 15 minutes |
1.9.34 | Microsoft network server: Digitally sign communications (always) | Enabled |
1.9.35 | Microsoft network server: Digitally sign communications (if client agrees) | Enabled |
1.9.36 | Microsoft network server: Disconnect clients when logon hours expire | Disabled |
1.9.37 | Network access: Do not allow anonymous enumeration of SAM accounts | Enabled |
1.9.38 | Network access: Do not allow anonymous enumeration of SAM accounts and shares | Enabled |
1.9.39 | Network access: Do not allow storage of credentials or .NET Passports for network authentication | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.9.40 | Network access: Let Everyone permissions apply to anonymous users | Disabled |
1.9.41 | Network access: Named Pipes that can be accessed anonymously | For the SSLF Member Server profile(s), the recommended value is browser. For the SSLF Domain Controller profile(s), the recommended value is: netlogon, lsarpc, samr, browser. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.9.42 | Network access: Remotely accessible registry paths | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is: System\CurrentControlSet\Control\ProductOptions System\CurrentControlSet\Control\Server Applications Software\Microsoft\Windows NT\CurrentVersion |
1.9.43 | Network access: Restrict anonymous access to Named Pipes and Shares | Enabled |
1.9.44 | Network access: Shares that can be accessed anonymously | None |
1.9.45 | Network access: Sharing and security model for local accounts | For all profiles, the recommended state for this setting is Classic - local users authenticate as themselves. |
1.9.46 | Network security: Do not store LAN Manager hash value on next password change | Enabled |
1.9.47 | Network security: LAN Manager authentication level | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Send NTLMv2 response only. Refuse LM. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Send NTLMv2 response only. Refuse LM & NTLM. |
1.9.48 | Network security: LDAP client signing requirements | Negotiate signing |
1.9.49 | Network security: Minimum session security for NTLM SSP based (including secure RPC) clients | Require NTLMv2 session security, Require 128-bit encryption |
1.9.50 | Recovery console: Allow automatic administrative logon | Disabled |
1.9.51 | Recovery console: Allow floppy copy and access to all drives and all folders | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Disabled. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.9.52 | Shutdown: Clear virtual memory pagefile | Disabled |
1.9.53 | Shutdown: Allow system to be shut down without having to log on | Disabled |
1.9.54 | System objects: Require case insensitivity for non-Windows subsystems | Enabled |
1.9.55 | System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) | Enabled |
1.9.56 | System cryptography: Force strong key protection for user keys stored on the computer | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is User must enter a password each time they use a key. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is User is prompted when the key is first used. |
1.9.57 | System settings: Optional subsystems | None |
1.9.58 | System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.9.59 | MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended) | Disabled |
1.9.60 | MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) | For all profiles, the recommended state for this setting is Highest protection, source routing is completely disabled. |
1.9.61 | MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes | Disabled |
1.9.62 | MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is 5 minutes. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.9.62 | MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is 5 minutes. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.9.63 | MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic | For all profiles, the recommended state for this setting is Only ISAKMP is exempt (recommended for Windows Server 2003). |
1.9.64 | MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers | Enabled |
1.9.65 | MSS: (NtfsDisable8dot3NameCreation) Enable the computer to stop generating 8.3 style filenames (recommended) | Enabled |
1.9.66 | MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS) | Disabled |
1.9.67 | MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) | Enabled |
1.9.68 | MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended) | 0 |
1.9.69 | MSS: (TCPMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default) | 3 |
1.9.70 | MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning | 90% or less |
1.9.71 | MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) | For all profiles, the recommended state for this setting is Highest protection, source routing is completely disabled. |
1.9.72 | MSS: (TCPMaxDataRetransmissions) IPv6 How many times unacknowledged data is retransmitted (3 recommended, 5 is default) | 3 |
Terminal Services
1.10 | Terminal Services | Setting |
---|---|---|
1.10.1 | Always prompt client for password upon connection | Enabled |
1.10.2 | Set client connection encryption level | Enabled: High Level |
1.10.3 | Do not allow drive redirection | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Configured. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled. |
1.10.4 | Do not allow passwords to be saved | Enabled |
Internet Communications
1.11 | Internet Communication | Setting |
---|---|---|
1.11.1 | Turn off downloading of print drivers over HTTP | Enabled |
1.11.2 | Turn off the "Publish to Web" task for files and folders | Enabled |
1.11.3 | Turn off Internet download for Web publishing and online ordering wizards | Enabled |
1.11.4 | Turn off printing over HTTP | Enabled |
1.11.5 | Turn off Search Companion content file updates | Enabled |
1.11.6 | Turn off the Windows Messenger Customer Experience Improvement Program | Enabled |
1.11.7 | Turn off Windows Update device driver searching | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
188Additional Security Settings
1.12 | Additional Security Settings | Setting |
---|---|---|
1.12.1 | Do not process the legacy run list | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Configured. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled. |
1.12.2 | Do not process the run once list | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Configured. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled. |
1.12.3 | Registry policy processing | For the Enterprise Member Server and SSLF Member Server profile(s), the recommended value is Enabled (Process even if the Group Policy objects have not changed). For the Enterprise Domain Controller and SSLF Domain Controller profile(s), the recommended value is Not Defined. |
1.12.4 | Offer Remote Assistance | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Disabled. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.12.5 | Solicited Remote Assistance | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Disabled. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.12.6 | Restrictions for Unauthenticated RPC clients | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled: Authenticated. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.12.7 | RPC Endpoint Mapper Client Authentication | For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Enabled. For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Defined. |
1.12.8 | Turn off Autoplay | Enabled: All drives |
1.12.9 | Enumerate administrator accounts on elevation | For the Enterprise Member Server and Enterprise Domain Controller profile(s), the recommended value is Not Configured. For the SSLF Member Server and SSLF Domain Controller profile(s), the recommended value is Disabled. |
1.12.10 | Require trusted path for credential entry | Enabled |
1.12.11 | Disable remote Desktop Sharing | Enabled |
Useful Links and References
Center for Internet
Microsoft Threats and Countermeasures Guide
The purpose of this guide is to provide a reference to many of the security settings available in the current versions of the Microsoft Windows operating systems.
Microsoft – The Ten Immutable Laws of Security
https://blogs.technet.microsoft.com/rhalbheer/2011/06/16/ten-immutable-laws-of-security-version-2-0/