Windows Server 2019 基线检查表 (1)
zhezhongyun 2025-07-23 19:24 4 浏览
Control | Set Correctly | ||
Yes | No | ||
1 | Account Policies | ||
1.1 | Password Policy | ||
1.1.1 | (L1) Ensure 'Enforce password history' is set to '24 or more password(s)' (Automated) | ||
1.1.2 | (L1) Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' (Automated) | ||
1.1.3 | (L1) Ensure 'Minimum password age' is set to '1 or more day(s)' (Automated) | ||
1.1.4 | (L1) Ensure 'Minimum password length' is set to '14 or more character(s)' (Automated) | ||
1.1.5 | (L1) Ensure 'Password must meet complexity requirements' is set to 'Enabled' (Automated) | ||
1.1.6 | (L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled' (Automated) | ||
1.2 | Account Lockout Policy | ||
1.2.1 | (L1) Ensure 'Account lockout duration' is set to '15 or more minute(s)' (Automated) | ||
1.2.2 | (L1) Ensure 'Account lockout threshold' is set to '10 or fewer invalid logon attempt(s), but not 0' (Automated) | ||
1.2.3 | (L1) Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)' (Automated) | ||
2 | Local Policies | ||
2.1 | Audit Policy | ||
2.2 | User Rights Assignment | ||
2.2.1 | (L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One' (Automated) | ||
2.2.2 | (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users, ENTERPRISE DOMAIN CONTROLLERS' (DC only) (Automated) | ||
2.2.3 | (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only) (Automated) | ||
2.2.4 | (L1) Ensure 'Act as part of the operating system' is set to 'No One' (Automated) |
Control | Set Correctly | ||
Yes | No | ||
2.2.5 | (L1) Ensure 'Add workstations to domain' is set to 'Administrators' (DC only) (Automated) | ||
2.2.6 | (L1) Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE' (Automated) | ||
2.2.7 | (L1) Ensure 'Allow log on locally' is set to 'Administrators' (Automated) | ||
2.2.8 | (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only) (Automated) | ||
2.2.9 | (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only) (Automated) | ||
2.2.10 | (L1) Ensure 'Back up files and directories' is set to 'Administrators' (Automated) | ||
2.2.11 | (L1) Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE' (Automated) | ||
2.2.12 | (L1) Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE' (Automated) | ||
2.2.13 | (L1) Ensure 'Create a pagefile' is set to 'Administrators' (Automated) | ||
2.2.14 | (L1) Ensure 'Create a token object' is set to 'No One' (Automated) | ||
2.2.15 | (L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (Automated) | ||
2.2.16 | (L1) Ensure 'Create permanent shared objects' is set to 'No One' (Automated) | ||
2.2.17 | (L1) Ensure 'Create symbolic links' is set to 'Administrators' (DC only) (Automated) | ||
2.2.18 | (L1) Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines' (MS only) (Automated) | ||
2.2.19 | (L1) Ensure 'Debug programs' is set to 'Administrators' (Automated) | ||
2.2.20 | (L1) Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only) (Automated) | ||
2.2.21 | (L1) Ensure 'Deny access to this computer from the network' to include 'Guests, Local account and member of Administrators group' (MS only) (Automated) | ||
2.2.22 | (L1) Ensure 'Deny log on as a batch job' to include 'Guests' (Automated) |
Control | Set Correctly | ||
Yes | No | ||
2.2.23 | (L1) Ensure 'Deny log on as a service' to include 'Guests' (Automated) | ||
2.2.24 | (L1) Ensure 'Deny log on locally' to include 'Guests' (Automated) | ||
2.2.25 | (L1) Ensure 'Deny log on through Remote Desktop Services' to include 'Guests' (DC only) (Automated) | ||
2.2.26 | (L1) Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account' (MS only) (Automated) | ||
2.2.27 | (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'Administrators' (DC only) (Automated) | ||
2.2.28 | (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only) (Automated) | ||
2.2.29 | (L1) Ensure 'Force shutdown from a remote system' is set to 'Administrators' (Automated) | ||
2.2.30 | (L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE' (Automated) | ||
2.2.31 | (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only) (Automated) | ||
2.2.32 | (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' and (when the Web Server (IIS) Role with Web Services Role Service is installed) 'IIS_IUSRS' (MS only) (Automated) | ||
2.2.33 | (L1) Ensure 'Increase scheduling priority' is set to 'Administrators, Window Manager\Window Manager Group' (Automated) | ||
2.2.34 | (L1) Ensure 'Load and unload device drivers' is set to 'Administrators' (Automated) | ||
2.2.35 | (L1) Ensure 'Lock pages in memory' is set to 'No One' (Automated) | ||
2.2.36 | (L2) Ensure 'Log on as a batch job' is set to 'Administrators' (DC Only) (Automated) | ||
2.2.37 | (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only) (Automated) | ||
2.2.38 | (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only) (Automated) |
Control | Set Correctly | ||
Yes | No | ||
2.2.39 | (L1) Ensure 'Modify an object label' is set to 'No One' (Automated) | ||
2.2.40 | (L1) Ensure 'Modify firmware environment values' is set to 'Administrators' (Automated) | ||
2.2.41 | (L1) Ensure 'Perform volume maintenance tasks' is set to 'Administrators' (Automated) | ||
2.2.42 | (L1) Ensure 'Profile single process' is set to 'Administrators' (Automated) | ||
2.2.43 | (L1) Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost' (Automated) | ||
2.2.44 | (L1) Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE' (Automated) | ||
2.2.45 | (L1) Ensure 'Restore files and directories' is set to 'Administrators' (Automated) | ||
2.2.46 | (L1) Ensure 'Shut down the system' is set to 'Administrators' (Automated) | ||
2.2.47 | (L1) Ensure 'Synchronize directory service data' is set to 'No One' (DC only) (Automated) | ||
2.2.48 | (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators' (Automated) | ||
2.3 | Security Options | ||
2.3.1 | Accounts | ||
2.3.1.1 | (L1) Ensure 'Accounts: Administrator account status' is set to 'Disabled' (MS only) (Automated) | ||
2.3.1.2 | (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts' (Automated) | ||
2.3.1.3 | (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only) (Automated) | ||
2.3.1.4 | (L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled' (Automated) | ||
2.3.1.5 | (L1) Configure 'Accounts: Rename administrator account' (Automated) | ||
2.3.1.6 | (L1) Configure 'Accounts: Rename guest account' (Automated) | ||
2.3.2 | Audit | ||
2.3.2.1 | (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled' (Automated) |
Control | Set Correctly | ||
Yes | No | ||
2.3.2.2 | (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' (Automated) | ||
2.3.3 | DCOM | ||
2.3.4 | Devices | ||
2.3.4.1 | (L1) Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators' (Automated) | ||
2.3.4.2 | (L1) Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled' (Automated) | ||
2.3.5 | Domain controller | ||
2.3.5.1 | (L1) Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC only) (Automated) | ||
2.3.5.2 | (L1) Ensure 'Domain controller: Allow vulnerable Netlogon secure channel connections' is set to 'Not Configured' (DC Only) (Automated) | ||
2.3.5.3 | (L1) Ensure 'Domain controller: LDAP server channel binding token requirements' is set to 'Always' (DC Only) (Automated) | ||
2.3.5.4 | (L1) Ensure 'Domain controller: LDAP server signing requirements' is set to 'Require signing' (DC only) (Automated) | ||
2.3.5.5 | (L1) Ensure 'Domain controller: Refuse machine account password changes' is set to 'Disabled' (DC only) (Automated) | ||
2.3.6 | Domain member | ||
2.3.6.1 | (L1) Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled' (Automated) | ||
2.3.6.2 | (L1) Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled' (Automated) | ||
2.3.6.3 | (L1) Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled' (Automated) | ||
2.3.6.4 | (L1) Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled' (Automated) | ||
2.3.6.5 | (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' (Automated) | ||
2.3.6.6 | (L1) Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled' (Automated) | ||
2.3.7 | Interactive logon |
Control | Set Correctly | ||
Yes | No | ||
2.3.7.1 | (L1) Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled' (Automated) | ||
2.3.7.2 | (L1) Ensure 'Interactive logon: Don't display last signed-in' is set to 'Enabled' (Automated) | ||
2.3.7.3 | (L1) Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not 0' (Automated) | ||
2.3.7.4 | (L1) Configure 'Interactive logon: Message text for users attempting to log on' (Automated) | ||
2.3.7.5 | (L1) Configure 'Interactive logon: Message title for users attempting to log on' (Automated) | ||
2.3.7.6 | (L2) Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to '4 or fewer logon(s)' (MS only) (Automated) | ||
2.3.7.7 | (L1) Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days' (Automated) | ||
2.3.7.8 | (L1) Ensure 'Interactive logon: Require Domain Controller Authentication to unlock workstation' is set to 'Enabled' (MS only) (Automated) | ||
2.3.7.9 | (L1) Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher (Automated) | ||
2.3.8 | Microsoft network client | ||
2.3.8.1 | (L1) Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled' (Automated) | ||
2.3.8.2 | (L1) Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled' (Automated) | ||
2.3.8.3 | (L1) Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled' (Automated) | ||
2.3.9 | Microsoft network server | ||
2.3.9.1 | (L1) Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)' (Automated) | ||
2.3.9.2 | (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled' (Automated) | ||
2.3.9.3 | (L1) Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled' (Automated) | ||
2.3.9.4 | (L1) Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled' (Automated) |
Control | Set Correctly | ||
Yes | No | ||
2.3.9.5 | (L1) Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or higher (MS only) (Automated) | ||
2.3.10 | Network access | ||
2.3.10.1 | (L1) Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled' (Automated) | ||
2.3.10.2 | (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (MS only) (Automated) | ||
2.3.10.3 | (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (MS only) (Automated) | ||
2.3.10.4 | (L2) Ensure 'Network access: Do not allow storage of passwords and credentials for network authentication' is set to 'Enabled' (Automated) | ||
2.3.10.5 | (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled' (Automated) | ||
2.3.10.6 | (L1) Configure 'Network access: Named Pipes that can be accessed anonymously' (DC only) (Automated) | ||
2.3.10.7 | (L1) Configure 'Network access: Named Pipes that can be accessed anonymously' (MS only) (Automated) | ||
2.3.10.8 | (L1) Configure 'Network access: Remotely accessible registry paths' is configured (Automated) | ||
2.3.10.9 | (L1) Configure 'Network access: Remotely accessible registry paths and sub-paths' is configured (Automated) | ||
2.3.10.10 | (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' (Automated) | ||
2.3.10.11 | (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only) (Automated) | ||
2.3.10.12 | (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' (Automated) | ||
2.3.10.13 | (L1) Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves' (Automated) | ||
2.3.11 | Network security | ||
2.3.11.1 | (L1) Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to 'Enabled' (Automated) | ||
2.3.11.2 | (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' (Automated) |
Control | Set Correctly | ||
Yes | No | ||
2.3.11.3 | (L1) Ensure 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' is set to 'Disabled' (Automated) | ||
2.3.11.4 | (L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types' (Automated) | ||
2.3.11.5 | (L1) Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled' (Automated) | ||
2.3.11.6 | (L1) Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled' (Manual) | ||
2.3.11.7 | (L1) Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM' (Automated) | ||
2.3.11.8 | (L1) Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher (Automated) | ||
2.3.11.9 | (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption' (Automated) | ||
2.3.11.10 | (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to 'Require NTLMv2 session security, Require 128-bit encryption' (Automated) | ||
2.3.12 | Recovery console | ||
2.3.13 | Shutdown | ||
2.3.13.1 | (L1) Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled' (Automated) | ||
2.3.14 | System cryptography | ||
2.3.15 | System objects | ||
2.3.15.1 | (L1) Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled' (Automated) | ||
2.3.15.2 | (L1) Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled' (Automated) | ||
2.3.16 | System settings | ||
2.3.17 | User Account Control |
Control | Set Correctly | ||
Yes | No | ||
2.3.17.1 | (L1) Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' (Automated) | ||
2.3.17.2 | (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' (Automated) | ||
2.3.17.3 | (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' (Automated) | ||
2.3.17.4 | (L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled' (Automated) | ||
2.3.17.5 | (L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled' (Automated) | ||
2.3.17.6 | (L1) Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled' (Automated) | ||
2.3.17.7 | (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' (Automated) | ||
2.3.17.8 | (L1) Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to 'Enabled' (Automated) | ||
3 | Event Log | ||
4 | Restricted Groups | ||
5 | System Services | ||
6 | Registry | ||
7 | File System | ||
8 | Wired Network (IEEE 802.3) Policies | ||
9 | Windows Firewall with Advanced Security | ||
9.1 | Domain Profile | ||
9.1.1 | (L1) Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)' (Automated) | ||
9.1.2 | (L1) Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)' (Automated) | ||
9.1.3 | (L1) Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)' (Automated) | ||
9.1.4 | (L1) Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No' (Automated) |
Control | Set Correctly | ||
Yes | No | ||
9.1.5 | (L1) Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\domainfw.log' (Automated) | ||
9.1.6 | (L1) Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater' (Automated) | ||
9.1.7 | (L1) Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes' (Automated) | ||
9.1.8 | (L1) Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes' (Automated) | ||
9.2 | Private Profile | ||
9.2.1 | (L1) Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)' (Automated) | ||
9.2.2 | (L1) Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)' (Automated) | ||
9.2.3 | (L1) Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)' (Automated) | ||
9.2.4 | (L1) Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No' (Automated) | ||
9.2.5 | (L1) Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\privatefw.log' (Automated) | ||
9.2.6 | (L1) Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater' (Automated) | ||
9.2.7 | (L1) Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes' (Automated) | ||
9.2.8 | (L1) Ensure 'Windows Firewall: Private: Logging: Log successful connections' is set to 'Yes' (Automated) | ||
9.3 | Public Profile | ||
9.3.1 | (L1) Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)' (Automated) | ||
9.3.2 | (L1) Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)' (Automated) | ||
9.3.3 | (L1) Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)' (Automated) | ||
9.3.4 | (L1) Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'No' (Automated) | ||
9.3.5 | (L1) Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No' (Automated) |
Control | Set Correctly | ||
Yes | No | ||
9.3.6 | (L1) Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' (Automated) | ||
9.3.7 | (L1) Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\publicfw.log' (Automated) | ||
9.3.8 | (L1) Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater' (Automated) | ||
9.3.9 | (L1) Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes' (Automated) | ||
9.3.10 | (L1) Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes' (Automated) | ||
10 | Network List Manager Policies | ||
11 | Wireless Network (IEEE 802.11) Policies | ||
12 | Public Key Policies | ||
13 | Software Restriction Policies | ||
14 | Network Access Protection NAP Client Configuration | ||
15 | Application Control Policies | ||
16 | IP Security Policies | ||
17 | Advanced Audit Policy Configuration | ||
17.1 | Account Logon | ||
17.1.1 | (L1) Ensure 'Audit Credential Validation' is set to 'Success and Failure' (Automated) | ||
17.1.2 | (L1) Ensure 'Audit Kerberos Authentication Service' is set to 'Success and Failure' (DC Only) (Automated) | ||
17.1.3 | (L1) Ensure 'Audit Kerberos Service Ticket Operations' is set to 'Success and Failure' (DC Only) (Automated) | ||
17.2 | Account Management | ||
17.2.1 | (L1) Ensure 'Audit Application Group Management' is set to 'Success and Failure' (Automated) | ||
17.2.2 | (L1) Ensure 'Audit Computer Account Management' is set to include 'Success' (DC only) (Automated) | ||
17.2.3 | (L1) Ensure 'Audit Distribution Group Management' is set to include 'Success' (DC only) (Automated) | ||
17.2.4 | (L1) Ensure 'Audit Other Account Management Events' is set to include 'Success' (DC only) (Automated) | ||
17.2.5 | (L1) Ensure 'Audit Security Group Management' is set to include 'Success' (Automated) | ||
17.2.6 | (L1) Ensure 'Audit User Account Management' is set to 'Success and Failure' (Automated) | ||
17.3 | Detailed Tracking |
Control | Set Correctly | ||
Yes | No | ||
17.3.1 | (L1) Ensure 'Audit PNP Activity' is set to include 'Success' (Automated) | ||
17.3.2 | (L1) Ensure 'Audit Process Creation' is set to include 'Success' (Automated) | ||
17.4 | DS Access | ||
17.4.1 | (L1) Ensure 'Audit Directory Service Access' is set to include 'Failure' (DC only) (Automated) | ||
17.4.2 | (L1) Ensure 'Audit Directory Service Changes' is set to include 'Success' (DC only) (Automated) | ||
17.5 | Logon/Logoff | ||
17.5.1 | (L1) Ensure 'Audit Account Lockout' is set to include 'Failure' (Automated) | ||
17.5.2 | (L1) Ensure 'Audit Group Membership' is set to include 'Success' (Automated) | ||
17.5.3 | (L1) Ensure 'Audit Logoff' is set to include 'Success' (Automated) | ||
17.5.4 | (L1) Ensure 'Audit Logon' is set to 'Success and Failure' (Automated) | ||
17.5.5 | (L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure' (Automated) | ||
17.5.6 | (L1) Ensure 'Audit Special Logon' is set to include 'Success' (Automated) | ||
17.6 | Object Access | ||
17.6.1 | (L1) Ensure 'Audit Detailed File Share' is set to include 'Failure' (Automated) | ||
17.6.2 | (L1) Ensure 'Audit File Share' is set to 'Success and Failure' (Automated) | ||
17.6.3 | (L1) Ensure 'Audit Other Object Access Events' is set to 'Success and Failure' (Automated) | ||
17.6.4 | (L1) Ensure 'Audit Removable Storage' is set to 'Success and Failure' (Automated) | ||
17.7 | Policy Change | ||
17.7.1 | (L1) Ensure 'Audit Audit Policy Change' is set to include 'Success' (Automated) | ||
17.7.2 | (L1) Ensure 'Audit Authentication Policy Change' is set to include 'Success' (Automated) | ||
17.7.3 | (L1) Ensure 'Audit Authorization Policy Change' is set to include 'Success' (Automated) | ||
17.7.4 | (L1) Ensure 'Audit MPSSVC Rule-Level Policy Change' is set to 'Success and Failure' (Automated) |
Control | Set Correctly | ||
Yes | No | ||
17.7.5 | (L1) Ensure 'Audit Other Policy Change Events' is set to include 'Failure' (Automated) | ||
17.8 | Privilege Use | ||
17.8.1 | (L1) Ensure 'Audit Sensitive Privilege Use' is set to 'Success and Failure' (Automated) | ||
17.9 | System | ||
17.9.1 | (L1) Ensure 'Audit IPsec Driver' is set to 'Success and Failure' (Automated) | ||
17.9.2 | (L1) Ensure 'Audit Other System Events' is set to 'Success and Failure' (Automated) | ||
17.9.3 | (L1) Ensure 'Audit Security State Change' is set to include 'Success' (Automated) | ||
17.9.4 | (L1) Ensure 'Audit Security System Extension' is set to include 'Success' (Automated) | ||
17.9.5 | (L1) Ensure 'Audit System Integrity' is set to 'Success and Failure' (Automated) |
相关推荐
- C#.NET NLog 详解(c#nuget)
-
简介NLog是.NET平台上最流行的开源日志框架之一,特色是灵活的配置、丰富的输出目标(Target),以及高性能的异步写入能力。适用场景:从控制台、文件、数据库、网络到Elastic...
- WPF中datagrid单元格背景颜色(wpf datagrid单元格编辑)
-
datagrid中AutoGenerateColumns="true",使用viewmodel中绑定的数据源。后台代码找到目标字段,重写IValueConverter值转换器接口,根...
- Unity Profiler实战指南:从卡顿到丝滑的性能优化之旅
-
当玩家说"这游戏卡爆了"时,你该怎么办?"角色移动时帧率从60掉到20,技能特效一放直接卡成PPT"——这是《幻境冒险》项目上线前测试阶段收到的玩家反馈。作为主程的我知...
- Windows下取文件属性特例(windows文件属性快捷键)
-
今日碰到有程序在我们产品系统环境下无法正常运行某些功能,使用ProcessMonitor加反复测试发现,与产品中创建的symlink(软链接)有关。具体来讲,symlink文件是一个软链接文件,它的...
- 展开说说,DOS有哪些常用、实用的命令?
-
晚上好,我是老杨,今天来聊聊常用的DOS命令。虽然是老古董,但不妨碍它的好用程度。可能一些新手不晓得,但是和老杨一个年纪的,一定对DOS系统不陌生。尽管现在大多数电脑的操作系统是Windows,但在W...
- webservice更改返回信息节点名称(webservice返回值)
-
问题详情:<!--访问webservice中,返回的信息--><soap:Envelopexmlns:soap="http://schemas.xmlsoap.org/s...
- Windows Server 2019 基线检查表 (1)
-
ControlSetCorrectlyYesNo1AccountPolicies1.1PasswordPolicy1.1.1(L1)Ensure'Enforcepasswordh...
- MapStruct架构设计(mapstruct官方文档)
-
MapStruct架构原理及改造一、前言4二、什么是语法树(AST)42.1Java编译时的三个阶段4三、什么是JSR26953.1使用步骤53.2流程图6四、源码架构分析64.1...
- Excel常用技能分享与探讨(6-实战小功能分享 三)
-
书接上文,上一篇主要写了如何用代码动态创建控件,这一章讲讲如何具体实现我们需要的功能。五、功能性代码我们添加两个OptionButton的目的就是为了切换到对应的工具,所以,我们需要的是在点击了相对应...
- 30天学会Python编程:8. Python面向对象编程
-
8.1OOP基础概念8.1.1面向对象三大特性8.1.2类与对象关系核心概念:类(Class):对象的蓝图/模板对象(Object):类的具体实例属性(Attribute):对象的状态/数据方法...
- 环境变量设置被禁止临时方案(为什么设置了环境变量还是会出现)
-
1,到官网下载ant安装包。官网下载地址:ApacheAnt-BinaryDistributions2,解压到本地不带中文目录下,我这儿是D盘并且改名为ant3,设置环镜变量时,发现云桌面系统...
- 一文读懂 JavaScript依赖注入(java依赖注入简单理解)
-
大家好,我是Echa。依赖注入DI(DependencyInjection)是编程领域中一个非常常见的设计模式,它指的是将应用程序所需的依赖关系(如服务或其他组件)通过构造函数参数或属性自动...
- TypeScript 熟练度自测:6 道题检验你的 TS 功底!
-
这些题目既可以测试基本的类型知识,也能考察面向对象编程、泛型、类型推导和高级类型等方面的能力。以下是几个我会出题的方向和具体题目:1.类型推导与基础类型目的:考察应聘者对TypeScript类型推...
- 怀旧服实用宏整理,猎人篇(怀旧服实用宏整理,猎人篇怎么用)
-
关于宏的贴子不少,这里我去芜存菁,整理并留下了觉得比较实用的宏命令,希望对大家有用。/m打开宏命令设置窗口宝宝清图腾宏/scriptlocalt,n,i,_={"根基\","...
- MS15-083:Windows SMB内存损坏漏洞分析
-
2015年8月11日微软发布了14个安全补丁,其中就包括一个SMB服务器补丁。在本文我将解释我是如何触发该漏洞的。微软安全公告MS15-083在所有的修复补丁中,我对“服务器消息块中的漏洞可能允许远程...
- 一周热门
- 最近发表
-
- C#.NET NLog 详解(c#nuget)
- WPF中datagrid单元格背景颜色(wpf datagrid单元格编辑)
- Unity Profiler实战指南:从卡顿到丝滑的性能优化之旅
- Windows下取文件属性特例(windows文件属性快捷键)
- 展开说说,DOS有哪些常用、实用的命令?
- webservice更改返回信息节点名称(webservice返回值)
- Windows Server 2019 基线检查表 (1)
- MapStruct架构设计(mapstruct官方文档)
- Excel常用技能分享与探讨(6-实战小功能分享 三)
- 30天学会Python编程:8. Python面向对象编程
- 标签列表
-
- HTML 教程 (33)
- HTML 简介 (35)
- HTML 实例/测验 (32)
- HTML 测验 (32)
- JavaScript 和 HTML DOM 参考手册 (32)
- HTML 拓展阅读 (30)
- HTML文本框样式 (31)
- HTML滚动条样式 (34)
- HTML5 浏览器支持 (33)
- HTML5 新元素 (33)
- HTML5 WebSocket (30)
- HTML5 代码规范 (32)
- HTML5 标签 (717)
- HTML5 标签 (已废弃) (75)
- HTML5电子书 (32)
- HTML5开发工具 (34)
- HTML5小游戏源码 (34)
- HTML5模板下载 (30)
- HTTP 状态消息 (33)
- HTTP 方法:GET 对比 POST (33)
- 键盘快捷键 (35)
- 标签 (226)
- HTML button formtarget 属性 (30)
- CSS 水平对齐 (Horizontal Align) (30)
- opacity 属性 (32)