Sie sind auf Seite 1von 21

NNT PCI DSS Microsoft Member Server 2016 v1217 Benchmark

15/12/2017 17:16
WIN-SERVER-2016 (192.168.17.232)

Detailed PCI DSS v3.2 Requirements and Security Assessment Procedures: NNT PCI DSS Microsoft Windows 10 To obtain the latest version of this guide, please
Compliance Score : 40.12% visit http://www.nntws.com If you have questions, comments, or have identified ways to improve this guide, please write us at support@nntws.com

242 of 607 rules passed


3 of 607 rules partially passed
362 of 607 rules failed

1 Build and Maintain a Secure Network and Systems: Requirement 1: Install and maintain a firewall
1.1 Requirement 1: Install and maintain a firewall configuration to protect cardholder data: Corporate Firewall and In-Scope Devices I
1.1.1 Requirement 1: Firewall configuration standards: Track and Approve Config Changes
Rule Name Score Pass / Fail
1.1.1.1 A formal process for approving and testing all network connections and changes to the firewall and router configurations 1 Pass

1.2 Requirement 1: Install and maintain a firewall configuration to protect cardholder data: Windows Server Firewall
1.2.1 Requirement 1: Firewall configuration standards: Windows Firewall With Advanced Security - Domain
Rule Name Score Pass / Fail
1.2.1.1 (L1) Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)' 0 Fail
1.2.1.2 (L1) Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)' 0 Fail
1.2.1.3 (L1) Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)' 0 Fail
1.2.1.4 (L1) Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No' (CCE Reference : CCE-38041-0) 0 Fail
1.2.1.5 Set 'Windows Firewall: Domain: Allow unicast response' to 'No' 0 Fail
1.2.1.6 (L1) Ensure 'Windows Firewall: Domain: Settings: Apply local firewall rules' is set to 'Yes (default)' 0 Fail
1.2.1.7 (L1) Ensure 'Windows Firewall: Domain: Settings: Apply local connection security rules' is set to 'Yes (default)' 0 Fail
1.2.1.8 (L1) Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SYSTEMROOT%\System32\logfiles\firewall\domainfw.log 0 Fail
1.2.1.9 (L1) Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater' 0 Fail
1.2.1.10 (L1) Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes' 0 Fail
1.2.1.11 (L1) Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes' 0 Fail
1.2.2 Requirement 1: Firewall configuration standards: Windows Firewall With Advanced Security - Private Profile
Rule Name Score Pass / Fail
1.2.2.1 (L1) Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)' 0 Fail
1.2.2.2 (L1) Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)' 0 Fail
1.2.2.3 (L1) Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)' 0 Fail
1.2.2.4 (L1) Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No' (CCE Reference : CCE-37621-0) 0 Fail
1.2.2.5 Set 'Windows Firewall: Private: Allow unicast response' to 'No' 0 Fail
1.2.2.6 (L1) Ensure 'Windows Firewall: Private: Settings: Apply local firewall rules' is set to 'Yes (default)' 0 Fail
1.2.2.7 (L1) Ensure 'Windows Firewall: Private: Settings: Apply local connection security rules' is set to 'Yes (default)' 0 Fail
1.2.2.8 (L1) Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SYSTEMROOT%\System32\logfiles\firewall\privatefw.log' 0 Fail
1.2.2.9 (L1) Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater' 0 Fail
1.2.2.10 (L1) Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes' 0 Fail

Copyright NNT 2017 Page 1


1.2.2.11 (L1) Ensure 'Windows Firewall: Private: Logging: Log successful connections' is set to 'Yes' 0 Fail
1.2.3 Requirement 1: Firewall configuration standards: Windows Firewall With Advanced Security - Public Profile
Rule Name Score Pass / Fail
1.2.3.1 (L1) Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)' 0 Fail
1.2.3.2 (L1) Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)' 0 Fail
1.2.3.3 (L1) Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)' 0 Fail
1.2.3.4 (L1) Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'Yes' (CCE Reference : CCE-38043-6) 0 Fail
1.2.3.5 Set 'Windows Firewall: Public: Allow unicast response' to 'No' 0 Fail
1.2.3.6 (L1) Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No' 0 Fail
1.2.3.7 (L1) Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' 0 Fail
1.2.3.8 (L1) Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SYSTEMROOT%\System32\logfiles\firewall\publicfw.log' 0 Fail
1.2.3.9 (L1) Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater' 0 Fail
1.2.3.10 (L1) Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes' 0 Fail
1.2.3.11 (L1) Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes' 0 Fail

2 Build and Maintain a Secure Network and Systems: Requirement 2: Do not use vendor-supplied defaults
2.1 Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters: Develop configuration
2.1.1 Requirement 2: System Hardening - Default User Accounts
Rule Name Score Pass / Fail
2.1.1.1 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' 1 Pass
2.1.1.2 (L1) Configure 'Accounts: Rename administrator account' 0 Fail
2.1.1.3 (L1) Configure 'Accounts: Rename guest account' 0 Fail
2.1.2 Requirement 2: System Hardening - Personalization Rules
Rule Name Score Pass / Fail
2.1.2.1 (L1) Ensure 'Enable screen saver' is set to 'Enabled' 0 Fail
2.1.2.2 (L1) Ensure 'Force specific screen saver: Screen saver executable name' is set to 'Enabled: scrnsave.scr' 0 Fail
2.1.2.3 (L1) Ensure 'Password protect the screen saver' is set to 'Enabled' 0 Fail
2.1.2.4 (L1) Ensure 'Screen saver timeout' is set to 'Enabled: 900 seconds or fewer, but not 0' 0.5 Fail
2.1.2.5 (L2) Ensure 'Turn off Help Experience Improvement Program' is set to 'Enabled' 0 Fail
2.1.2.6 (L2) Ensure 'Allow Use of Camera' is set to 'Disabled' 0 Fail
2.1.3 Requirement 2: System Hardening - Attachment Manager Rules
Rule Name Score Pass / Fail
2.1.3.1 (L1) Ensure 'Do not preserve zone information in file attachments' is set to 'Disabled' 0 Fail
2.2 Requirement 2: System Hardening: Non-Default Services List - Verify that system configuration standards include the following pr
2.2.1 Requirement 2: System Hardening: Check for any Non-Default Services
Rule Name Score Pass / Fail
2.2.1.1 Check for any Non-Default Services 0 Fail

Copyright NNT 2017 Page 2


2.3 Requirement 2: System Hardening: Mandatory Services List - Verify that system configuration standards include the following pro
2.3.1 Requirement 2: System Hardening: Mandatory Services List
Rule Name Score Pass / Fail
2.3.1.1 AllJoyn Router Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.2 App Readiness Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.3 Application Host Helper Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.4 Application Identity Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.5 Application Information Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.6 Application Layer Gateway Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.7 Application Management Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.8 AppX Deployment Service (AppXSVC) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.9 ASP.NET State Service (aspnet_state) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running 1 Pass
2.3.1.10 ActiveX Installer (AxInstSV) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.11 Auto Time Zone Updater (tzautoupdate) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.12 Background Intelligent Transfer Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.13 Background Tasks Infrastructure (BrokerInfrastructure) Service (Hardened Start Mode: Auto, Hardened Expected State: Run 1 Pass
2.3.1.14 Base Filtering Engine Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.15 Bluetooth Support Service (bthserv) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.16 CDPUserSvc (cdpusersvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.17 Certificate Propagation Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.18 Client License Service (ClipSVC) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.19 CNG Key Isolation Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.20 COM+ Event System Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.21 COM+ System Application Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.22 Computer Browser Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.23 Connected Devices Platform Service (CDPSvc) Service (Hardened Start Mode: Automatic, Hardened Expected State: Runni 1 Pass
2.3.1.24 Connected User Experiences and Telemetry (DiagTrack) Service (Hardened Start Mode: Automatic, Hardened Expected Sta 1 Pass
2.3.1.25 Contact Data (PimIndexMaintenanceSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.26 CoreMessaging (CoreMessagingRegistrar) Service (Hardened Start Mode: Automatic, Hardened Expected State: Running) 1 Pass
2.3.1.27 Credential Manager Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.28 Cryptographic Services Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.29 Data Sharing (DsSvc) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.30 Data Sharing (DcpSvc) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.31 DCOM Server Process Launcher Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.32 Device Association (deviceassociationservice) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, 1 Pass
2.3.1.33 Device Install (DeviceInstall) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.34 Device Management Enrollment (DmEnrollmentSvc) Service (Hardened Start Mode: Manual, Hardened Expected State: Sto 1 Pass
2.3.1.35 Device Setup (DsmSvc) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.36 DevQuery Background Discovery Broker (DevQueryBroker) Service (Hardened Start Mode: Manual, Hardened Expected Sta 1 Pass
2.3.1.37 DHCP Client Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.38 Diagnostic Policy Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.39 Diagnostic Service Host Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.40 Diagnostic System Host Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.41 Distributed Link Tracking Client Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass

Copyright NNT 2017 Page 3


2.3.1.42 Distributed Transaction Coordinator Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1 Requirement 2: System Hardening: Mandatory Services List contd.
Rule Name Score Pass / Fail
2.3.1.43 DMWAPPushService (dmwappushservice) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.44 DNS Client Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.45 Downloaded Maps Manager (MapsBroker) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.46 Embedded Mode (embeddedmode) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.47 The Enhanced Mitigation Experience Toolkit (EMET) Service (Hardened Start Mode: Manual, Hardened Expected State: Run 1 Pass
2.3.1.48 Encrypting File System (EFS) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.49 Enterprise App Management (EntAppSvc) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Run 1 Pass
2.3.1.50 Extensible Authentication Protocol Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.51 Function Discovery Provider Host Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.52 Function Discovery Resource Publication Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.53 Geolocation (lfsvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.54 Group Policy Client Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.55 Human Interface Device Access Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.56 HV Host (HvHost) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.57 Hyper-V Data Exchange Service (vmickvpexchange) Service (Hardened Start Mode: Manual, Hardened Expected State: Sto 1 Pass
2.3.1.58 Hyper-V Guest Service Interface (vmicguestinterface) Service (Hardened Start Mode: Manual, Hardened Expected State: Ru 1 Pass
2.3.1.59 Hyper-V Guest Shutdown Service (vmicshutdown) Service (Hardened Start Mode: Manual, Hardened Expected State: Runn 1 Pass
2.3.1.60 Hyper-V Heartbeat Service (vmicheartbeat) Service (Hardened Start Mode: Manual, Hardened Expected State: Running, Sto 1 Pass
2.3.1.61 Hyper-V PowerShell Direct Service (vmicvmsession) Service (Hardened Start Mode: Manual, Hardened Expected State: Run 1 Pass
2.3.1.62 Hyper-V Remote Desktop Virtualization Service (vmicrdv) Service (Hardened Start Mode: Manual, Hardened Expected State 1 Pass
2.3.1.63 Hyper-V Time Synchronization Service (vmictimesync) Service (Hardened Start Mode: Manual, Hardened Expected State: R 1 Pass
2.3.1.64 Hyper-V Volume Shadow Copy Requestor (vmicvss) Service (Hardened Start Mode: Manual, Hardened Expected State: Run 1 Pass
2.3.1.65 IKE and AuthIP IPsec Keying Modules Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running 1 Pass
2.3.1.66 Interactive Services Detection Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.67 Internet Connection Sharing (ICS) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.68 IP Helper Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.69 IPsec Policy Agent Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.70 KDC Proxy Server service (KPSSVC) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running 1 Pass
2.3.1.71 KtmRm for Distributed Transaction Coordinator Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped 1 Pass
2.3.1.72 Link-Layer Topology Discovery Mapper Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.73 Local Session Manager Service (Hardened Start Mode: Automatic, Hardened Expected State: Running) 1 Pass
2.3.1.74 Microsoft (R) Diagnostics Hub Standard Collector Service (diagnosticshub.standardcollector.service) Service (Hardened Sta 1 Pass
2.3.1.75 Microsoft App-V Client Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.76 Microsoft Account Sign-in Assistant Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.77 Microsoft iSCSI Initiator Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.78 Microsoft Passport (NgcSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.79 Microsoft Passport Container (NgcCtnrSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.80 Microsoft Software Shadow Copy Provider Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Run 1 Pass
2.3.1.81 Microsoft Storage Spaces SMP (smphost) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Run 1 Pass
2.3.1.82 Net.Tcp Port Sharing Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.83 Netlogon Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass

Copyright NNT 2017 Page 4


2.3.1.84 Network Access Protection Agent Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.85 Network Connections Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1 Requirement 2: System Hardening: Mandatory Services List contd.
Rule Name Score Pass / Fail
2.3.1.86 Network Connectivity Assistant (ncasvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.87 Network List Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.88 Network Location Awareness Service (Hardened Start Mode: Auto, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.89 Network Setup (NetSetupSvc) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.90 Network Store Interface Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.91 Offline Files (CscService) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.92 Optimize Drives (defragsvc) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.93 Performance Counter DLL Host (PerfHost) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Run 1 Pass
2.3.1.94 Performance Logs and Alerts Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.95 Phone (PhoneSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.96 Plug and Play Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.97 Portable Device Enumerator (WPDBusEnum) Service Hardened Start Mode: Manual, Hardened Expected State: Stopped, R 1 Pass
2.3.1.98 Power Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.99 Print Spooler Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.100 Printer Extensions and Notifications (PrintNotify) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopp 0 Fail
2.3.1.101 Problem Reports and Solutions Control Panel Support Service (Hardened Start Mode: Disabled, Hardened Expected State 0 Fail
2.3.1.102 Program Compatibility Assistant (PcaSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.103 Quality Windows Audio Video Experience (QWAVE) Service (Hardened Start Mode: Disabled, Hardened Expected State: S 0 Fail
2.3.1.104 Radio Management Service (RmSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.105 Remote Access Auto Connection Manager Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.106 Remote Access Connection Manager Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.107 Remote Desktop Configuration Service (Hardened Start Mode: Disabled, Hardened Expected State: Running) 0 Fail
2.3.1.108 Remote Desktop Services Service (Hardened Start Mode: Disabled, Hardened Expected State: Running) 0 Fail
2.3.1.109 Remote Desktop Services UserMode Port Redirector (Hardened Start Mode: Disabled, Hardened Expected State: Running 0 Fail
2.3.1.110 Remote Procedure Call (RPC) Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.111 Remote Procedure Call (RPC) Locator Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.112 Remote Registry Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped/Running) 0 Fail
2.3.1.113 Resultant Set of Policy Provider Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.114 Routing and Remote Access Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.115 RPC Endpoint Mapper Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.116 Secondary Logon Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.117 Secure Socket Tunneling Protocol Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.118 Security Accounts Manager Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.119 Sensor Data Service (SensorDataService) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.120 Sensor Monitoring Service (SensrSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.121 Sensor Service (SensorService) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.122 Server Service (Hardened Start Mode: Disabled, Hardened Expected State: Running) 0 Fail
2.3.1.123 Shell Hardware Detection Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.124 Smart Card Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.125 Smart Card Device Enumeration (ScDeviceEnum) Service (Hardened Start Mode: Disabled, Hardened Expected State: Sto 0 Fail

Copyright NNT 2017 Page 5


2.3.1.126 Smart Card Removal Policy (SCPolicySvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.127 SNMP Trap Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.128 Software Protection Service (Hardened Start Mode: Auto, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1 Requirement 2: System Hardening: Mandatory Services List contd.
Rule Name Score Pass / Fail
2.3.1.129 Special Administration Console Helper Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Runnin 1 Pass
2.3.1.130 Spot Verifier Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.131 SSDP Discovery Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.132 State Repository (StateRepository) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.133 Still Image Acquisition Events (WiaRpc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.134 Storage (StorSvc) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.135 Storage Tiers Management Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.136 Superfetch Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.137 Sync Host (OneSyncSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.138 System Event Notification Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.139 System Events Broker Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.140 Task Scheduler Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.141 TCP/IP NetBIOS Helper Service (Hardened Start Mode: Manual, Hardened Expected State: Running) 1 Pass
2.3.1.142 Telephony Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.143 Themes Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.144 Tile Data model server Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.145 Time Broker (TimeBrokerSvc) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.146 Touch Keyboard and Handwriting Panel Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.147 Update Orchestrator Service for Windows Update (UsoSvc) Service (Hardened Start Mode: Manual, Hardened Expected S 1 Pass
2.3.1.148 UPnP Device Host Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.149 User Access Logging Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.150 User Data Access (UserDataSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.151 User Data Storage (UnistoreSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.152 User Experience Virtualization (UevAgentService) Service (Hardened Start Mode: Disabled, Hardened Expected State: Sto 1 Pass
2.3.1.153 User Manager (UserManager) Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.154 User Profile (ProfSvc) Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.155 Virtual Disk Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.156 Volume Shadow Copy Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.157 WalletService (WalletService) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.158 Windows Audio Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.159 Windows Audio Endpoint Builder Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.160 Windows Biometric Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.161 Windows Connection Manager (wcmsvc) Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.162 Windows Camera Frame (FrameServer) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.163 Windows Defender Network Inspection (WdNisSvc) Service (Hardened Start Mode: Manual, Hardened Expected State: Sto 1 Pass
2.3.1.164 Windows Defender (WinDefend) Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.165 Windows Driver Foundation - User-mode Driver Framework (wudfsvc) Service (Hardened Start Mode: Manual, Hardened E 1 Pass
2.3.1.166 Windows Encryption Provider Host (WEPHOSTSVC) Service (Hardened Start Mode: Disabled, Hardened Expected State: 0 Fail
2.3.1.167 Windows Error Reporting (WerSvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Running/Stopped) 0 Fail

Copyright NNT 2017 Page 6


2.3.1.168 Windows Event Collector (Wecsvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Running/Stopped) 0 Fail
2.3.1.169 Windows Event Log (EventLog) Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.170 Windows Firewall (MpsSvc) Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.171 Windows Font Cache (FontCache) Service (Hardened Start Mode: Auto, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1 Requirement 2: System Hardening: Mandatory Services List contd.
Rule Name Score Pass / Fail
2.3.1.172 Windows Image Acquisition (WIA) (stisvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.173 Windows Insider (wisvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.174 Windows Installer Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.175 Windows License Manager (LicenseManager) Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped 1 Pass
2.3.1.176 Windows Management Instrumentation Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.177 Windows Mobile Hotspot Service (icssvc) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.178 Windows Modules Installer Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.179 Windows Push Notifications System (WpnService) Service (Hardened Start Mode: Disabled, Hardened Expected State: Sto 0 Fail
2.3.1.180 Windows Push Notifications User (WpnUserService) Service (Hardened Start Mode: Disabled, Hardened Expected State: S 1 Pass
2.3.1.181 Windows Presentation Foundation Font Cache (FontCache3.0.0.0) Service (Hardened Start Mode: Manual, Hardened Expe 1 Pass
2.3.1.182 Windows Remote Management (WS-Management) Service (Hardened Start Mode: Disabled, Hardened Expected State: St 0 Fail
2.3.1.183 Windows Search (WSearch) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 1 Pass
2.3.1.184 Windows Time Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.185 Windows Update Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped/Running) 1 Pass
2.3.1.186 WinHTTP Web Proxy Auto-Discovery (WinHttpAutoProxySvc) Service (Hardened Start Mode: Disabled, Hardened Expecte 0 Fail
2.3.1.187 Wired AutoConfig Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.188 WMI Performance Adapter Service (Hardened Start Mode: Manual, Hardened Expected State: Stopped, Running) 1 Pass
2.3.1.189 Workstation Service (Hardened Start Mode: Auto, Hardened Expected State: Running) 1 Pass
2.3.1.190 Xbox Live Auth Manager (XblAuthManager) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.3.1.191 Xbox Live Game Save (XblGameSave) Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.4 Requirement 2: System Hardening: Optional Services List - - Verify that system configuration standards include the following proc
2.4.1 Requirement 2: System Hardening: Optional Services List
Rule Name Score Pass / Fail
2.4.1.1 Optional Services List: NNT ChangeTracker Gen7 Agent (Gen7Agent) (Hardened Start Mode: Auto, Hardened Expected State 1 Pass
2.4.1.2 Optional Services List: NNT Change Tracker Gen 7 MongoDB Service (Hardened Start Mode: Auto, Hardened Expected State 1 Pass
2.4.1.3 Optional Services List: NNT Change Tracker Gen 7 Redis Service (Hardened Start Mode: Auto, Hardened Expected State: Ru 1 Pass
2.4.1.4 Optional Services List: ASP.NET State Service (aspnet_state) Service (Hardened Start Mode: Auto, Hardened Expected State 0 Fail
2.4.1.5 Optional Services List: World Wide Web Publishing Service (Hardened Start Mode: Disabled, Hardened Expected State: Stop 0 Fail
2.4.1.6 Optional Services List: W3C Logging Service (Hardened Start Mode: Disabled, Hardened Expected State: Stopped) 0 Fail
2.5 Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters: Develop configuration
2.5.1 Requirement 2: System Hardening: Group Policy Rules
Rule Name Score Pass / Fail
2.5.1.1 (L1) Ensure 'Configure registry policy processing: Do not apply during periodic background processing' is set to 'Enabled: FAL 0 Fail
2.5.1.2 (L1) Ensure 'Configure registry policy processing: Process even if the Group Policy objects have not changed' is set to 'Enable 0 Fail
2.5.1.3 (L1) Ensure 'Continue experiences on this device' is set to 'Disabled' 0 Fail
2.5.1.4 (L1) Ensure 'Turn off background refresh of Group Policy' is set to 'Disabled' 1 Pass

Copyright NNT 2017 Page 7


2.5.2 Requirement 2: System Hardening: Internet Communication settings Rules
Rule Name Score Pass / Fail
2.5.2.1 (L2) Ensure 'Turn off access to the Store' is set to 'Enabled' 0 Fail
2.5.2.2 (L2) Ensure 'Turn off downloading of print drivers over HTTP' is set to 'Enabled' 0 Fail
2.5.2.3 (L2) Ensure 'Turn off handwriting personalization data sharing' is set to 'Enabled' 0 Fail
2.5.2.4 (L2) Ensure 'Turn off handwriting recognition error reporting' is set to 'Enabled' 0 Fail
2.5.2.5 (L2) Ensure 'Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com' is set to 'Enabled' 0 Fail
2.5.2.6 (L2) Ensure 'Turn off Internet download for Web publishing and online ordering wizards' is set to 'Enabled' 0 Fail
2.5.2.7 (L2) Ensure 'Turn off printing over HTTP' is set to 'Enabled' 0 Fail
2.5.2.8 (L2) Ensure 'Turn off Registration if URL connection is referring to Microsoft.com' is set to 'Enabled' (CCE Reference : CCE-36 0 Fail
2.5.2.9 (L2) Ensure 'Turn off Search Companion content file updates' is set to 'Enabled' 0 Fail
2.5.2.10 (L2) Ensure 'Turn off the "Order Prints" picture task' is set to 'Enabled' 0 Fail
2.5.2.11 (L2) Ensure 'Turn off the "Publish to Web" task for files and folders' is set to 'Enabled' 0 Fail
2.5.2.12 (L2) Ensure 'Turn off the Windows Messenger Customer Experience Improvement Program' is set to 'Enabled' 0 Fail
2.5.2.13 (L2) Ensure 'Turn off Windows Customer Experience Improvement Program' is set to 'Enabled' 0 Fail
2.5.2.14 (L2) Ensure 'Turn off Windows Error Reporting' is set to 'Enabled' 0 Fail
2.5.3 Requirement 2: System Hardening: Personalization Rules
Rule Name Score Pass / Fail
2.5.3.1 (L1) Ensure 'Prevent enabling lock screen camera' is set to 'Enabled' (CCE Reference : CCE-38347-1) 0 Fail
2.5.3.2 (L1) Ensure 'Prevent enabling lock screen slide show' is set to 'Enabled' (CCE Reference : CCE-38348-9) 0 Fail
2.5.3.3 (L1) Ensure 'Allow Input Personalization' is set to 'Disabled' 0 Fail
2.5.4 Requirement 2: System Hardening: Search Rules
Rule Name Score Pass / Fail
2.5.4.1 (L1) Ensure 'Allow indexing of encrypted files' is set to 'Disabled' 0 Fail
2.5.4.2 (L1) Ensure 'Allow Cortana' is set to 'Disabled' 0 Fail
2.5.4.3 (L1) Ensure 'Allow Cortana above lock screen' is set to 'Disabled' 0 Fail
2.5.4.4 (L1) Ensure 'Allow search and Cortana to use location' is set to 'Disabled' 0 Fail

2.5.5 Requirement 2: System Hardening: Windows Installer Rules


Rule Name Score Pass / Fail
2.5.5.1 (L1) Ensure 'Allow user control over installs' is set to 'Disabled' 0 Fail
2.5.5.2 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled' 0 Fail
2.5.5.3 (L2) Ensure 'Prevent Internet Explorer security prompt for Windows Installer scripts' is set to 'Disabled' 0 Fail
2.5.5.4 (L1) Ensure 'Turn on PowerShell Script Block Logging' is set to 'Disabled' 0 Fail
2.5.5.5 (L1) Ensure 'Turn on PowerShell Transcription' is set to 'Disabled' 0 Fail
2.5.5.6 (L2) Ensure 'Allow Remote Shell Access' is set to 'Disabled' 0 Fail
2.5.5.7 (L1) Ensure 'Turn off toast notifications on the lock screen' is set to 'Enabled' 0 Fail
2.5.5.8 (L1) Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled' 0 Fail
2.5.5.9 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled' 0 Fail
2.5.5.10 (L2) Ensure 'Prevent Codec Download' is set to 'Enabled' 0 Fail

Copyright NNT 2017 Page 8


2.5.6 Requirement 2: System Hardening - Additional Measures: Administrative Templates (Computer) Rules
Rule Name Score Pass / Fail
2.5.6.1 (L1) Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' (MS only) 0 Fail
2.5.6.2 (L1) Ensure 'WDigest Authentication' is set to 'Disabled' 0 Fail
2.5.6.3 (L1) Ensure LAPS AdmPwd GPO Extension / CSE is installed (MS only) 0 Fail
2.5.6.4 (L1) Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' (MS only) 0 Fail
2.5.6.5 (L1) Ensure 'Enable Local Admin Password Management' is set to 'Enabled' (MS only) 0 Fail
2.5.6.6 (L1) Ensure 'Password Settings: Password Complexity' is set to 'Enabled: Large letters + small letters + numbers + special ch 0 Fail
2.5.6.7 (L1) Ensure 'Password Settings: Password Length' is set to 'Enabled: 15 or more' (MS only) 0 Fail
2.5.6.8 (L1) Ensure 'Password Settings: Password Age (Days)' is set to 'Enabled: 30 or fewer' (MS only) 0 Fail
2.5.6.9 (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with "Require Mutual Authentication" and "Require Integrity" set for all N 0 Fail
2.5.6.10 (L2) Disable IPv6 (Ensure TCPIP6 Parameter 'DisabledComponents' is set to '0xff (255)') 0 Fail
2.5.6.11 (L2) Ensure 'Configuration of wireless settings using Windows Connect Now' is set to 'Disabled' 0 Fail
2.5.6.12 (L2) Ensure 'Prohibit access of the Windows Connect Now wizards' is set to 'Enabled' 0 Fail
2.5.6.13 (L1) Ensure 'Minimize the number of simultaneous connections to the Internet or a Windows Domain' is set to 'Enabled' 0 Fail
2.5.6.14 (L2) Ensure 'Prohibit connection to non-domain networks when connected to domain authenticated network' is set to 'Enable 0 Fail
2.5.6.15 (L1) Ensure 'Include command line in process creation events' is set to 'Disabled' 0 Fail
2.5.6.16 (L2) Ensure 'Disallow copying of user input methods to the system account for sign-in' is set to 'Enabled' 0 Fail
2.5.6.17 (L1) Ensure 'Block user from showing account details on sign-in' is set to 'Enabled' 0 Fail
2.5.6.18 (L1) Ensure 'Untrusted Font Blocking' is set to 'Enabled: Block untrusted fonts and log events' 0 Fail
2.5.6.19 (L1) Ensure 'Turn off app notifications on the lock screen' is set to 'Enabled' 0 Fail
2.5.6.20 (L1) Ensure 'Turn on convenience PIN sign-in' is set to 'Disabled' 0 Fail
2.5.6.21 (L2) Ensure 'Allow network connectivity during connected-standby (on battery)' is set to 'Disabled' 0 Fail
2.5.6.22 (L2) Ensure 'Allow network connectivity during connected-standby (plugged in)' is set to 'Disabled' 0 Fail
2.5.6.23 (L2) Ensure 'Require a password when a computer wakes (on battery)' is set to 'Enabled' 0 Fail
2.5.6.24 (L2) Ensure 'Require a password when a computer wakes (plugged in)' is set to 'Enabled' 0 Fail
2.5.6.25 (L2) Ensure 'Turn off the advertising ID' is set to 'Enabled' 0 Fail
2.5.6.26 (L2) Ensure 'Enable Windows NTP Client' is set to 'Enabled' 0 Fail
2.5.6.27 (L2) Ensure 'Enable Windows NTP Server' is set to 'Disabled' (MS only) 0 Fail
2.5.6.28 (L2) Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled' 0 Fail
2.5.6.29 (L2) Ensure 'Let Windows apps *' is set to 'Enabled: Force Deny' 0 Fail
2.5.6.30 (L1) Ensure 'Turn off Microsoft consumer experiences' is set to 'Enabled' 0 Fail
2.5.6.31 (L1) Ensure 'Require pin for pairing' is set to 'Enabled' 0 Fail
2.5.6.32 (L1) Ensure 'Do not display the password reveal button' is set to 'Enabled' 0 Fail
2.5.6.33 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled' 0 Fail
2.5.6.34 (L1) Ensure 'Allow Telemetry' is set to 'Enabled: 0 - Security [Enterprise Only]' 0 Fail
2.5.6.35 (L1) Ensure 'Disable pre-release features or settings' is set to 'Disabled' 0 Fail
2.5.6.36 (L1) Ensure 'Do not show feedback notifications' is set to 'Enabled' 0 Fail
2.5.6.37 (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled' 0 Fail
2.5.6.38 (L1) Ensure 'Configure Windows SmartScreen' is set to 'Enabled' 0 Fail
2.5.6.39 (L1) Ensure 'Turn off Data Execution Prevention for Explorer' is set to 'Disabled' 0 Fail
2.5.6.40 (L1) Ensure 'Turn off heap termination on corruption' is set to 'Disabled' 0 Fail
2.5.6.41 (L1) Ensure 'Turn off shell protocol protected mode' is set to 'Disabled' 0 Fail
2.5.6.42 (L2) Ensure 'Turn off location' is set to 'Enabled' (CCE Reference : CCE-36886-0) 0 Fail

Copyright NNT 2017 Page 9


2.5.6.43 (L2) Ensure 'Allow Extensions' is set to 'Disabled' 0 Fail
2.5.6 Requirement 2: System Hardening - Additional Measures: Administrative Templates (Computer) Rules contd.
Rule Name Score Pass / Fail
2.5.6.44 (L2) Ensure 'Allow InPrivate Browsing' is set to 'Disabled' 0 Fail
2.5.6.45 (L1) Ensure 'Configure cookies' is set to 'Enabled: Block only 3rd-party cookies' or higher 0 Fail
2.5.6.46 (L1) Ensure 'Configure Password Manager' is set to 'Disabled' 0 Fail
2.5.6.47 (L2) Ensure 'Configure Pop-up Blocker' is set to 'Enabled' 0 Fail
2.5.6.48 (L1) Ensure 'Configure search suggestions in Address bar' is set to 'Disabled' 0 Fail
2.5.6.49 (L1) Ensure 'Configure SmartScreen Filter' is set to 'Enabled' 0 Fail
2.5.6.50 (L2) Ensure 'Prevent access to the about:flags page in Microsoft Edge' is set to 'Enabled' 0 Fail
2.5.6.51 (L2) Ensure 'Prevent bypassing SmartScreen prompts for files' is set to 'Enabled' 0 Fail
2.5.6.52 (L2) Ensure 'Prevent bypassing SmartScreen prompts for sites' is set to 'Enabled' 0 Fail
2.5.6.53 (L2) Ensure 'Prevent using Localhost IP address for WebRTC' is set to 'Enabled' 0 Fail
2.5.6.54 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled' 0 Fail
2.5.6.55 (L2) Ensure 'Turn off KMS Client Online AVS Validation' is set to 'Enabled' 0 Fail
2.5.6.56 (L2) Ensure 'Disable all apps from Windows Store' is set to 'Enabled' 0 Fail
2.5.6.57 (L1) Ensure 'Turn off Automatic Download and Install of updates' is set to 'Disabled' 0 Fail
2.5.6.58 (L1) Ensure 'Turn off the offer to update to the latest version of Windows' is set to 'Enabled' 0 Fail
2.5.6.59 (L2) Ensure 'Turn off the Store application' is set to 'Enabled' 0 Fail
2.5.6.60 (L2) Ensure 'Join Microsoft MAPS' is set to 'Disabled' 0 Fail
2.5.6.61 (L2) Ensure 'Configure Watson events' is set to 'Disabled' 0 Fail
2.5.6.62 (L2) Ensure 'Allow suggested apps in Windows Ink Workspace' is set to 'Disabled' 0 Fail
2.5.6.63 (L1) Ensure 'Allow Windows Ink Workspace' is set to 'Enabled: On, but disallow access above lock' OR 'Disabled' but not 'En 0 Fail
2.5.6.64 (L2) Ensure 'Configure Windows spotlight on Lock Screen' is set to Disabled' 0 Fail
2.5.6.65 (L1) Ensure 'Do not suggest third-party content in Windows spotlight' is set to 'Enabled' 0 Fail
2.5.6.66 (L2) Ensure 'Turn off all Windows spotlight features' is set to 'Enabled' 0 Fail
2.5.7 Requirement 2: System Hardening - Additional Measures: App runtime Rules
Rule Name Score Pass / Fail
2.5.7.1 (L1) Ensure 'Allow Microsoft accounts to be optional' is set to 'Enabled' 0 Fail
2.5.7.2 (L2) Ensure 'Block launching Windows Store apps with Windows Runtime API access from hosted content.' is set to 'Enabled' 0 Fail

2.5.8 Requirement 2: System Hardening - Additional Measures: User Account Control Rules
Rule Name Score Pass / Fail
2.5.8.1 (L1) Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' 0 Fail
2.5.8.2 (L1) Ensure 'User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop' is se 1 Pass
2.5.8.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prom 0 Fail
2.5.8.4 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation 0 Fail
2.5.8.5 (L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled' 1 Pass
2.5.8.6 (L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled 1 Pass
2.5.8.7 (L1) Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled' 1 Pass
2.5.8.8 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' 1 Pass
2.5.8.9 (L1) Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to 'Enabled' (CCE Refe 1 Pass

Copyright NNT 2017 Page 10


2.5.9 Requirement 2: System Hardening - Additional Measures: AutoPlay Policies Rules
Rule Name Score Pass / Fail
2.5.9.1 (L1) Ensure 'Disallow Autoplay for non-volume devices' is set to 'Enabled' 0 Fail
2.5.9.2 (L1) Ensure 'Set the default behavior for AutoRun' is set to 'Enabled: Do not execute any autorun commands' 0 Fail
2.5.9.3 (L1) Ensure 'Turn off Autoplay' is set to 'Enabled: All drives' 0 Fail
2.5.10 Requirement 2: System Hardening - Additional Measures: EMET Rules
Rule Name Score Pass / Fail
2.5.10.1 Ensure EMET is installed 0 Fail
2.5.10.2 Ensure 'Default Protections for Internet Explorer' is set to 'Enabled' 0 Fail
2.5.10.3 (L1) Ensure 'Default Protections for Popular Software' is set to 'Enabled' 0 Fail
2.5.10.4 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled' 0 Fail
2.5.10.5 Set 'System ASLR' to 'Enabled:Application Opt-In' 0 Fail
2.5.10.6 Set 'System DEP' to 'Enabled:Application Opt-Out' 0 Fail
2.5.10.7 Set 'System SEHOP' to 'Enabled:Application Opt-Out' 0 Fail

2.5.11 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - User Rights Assignment
Rule Name Score Pass / Fail
2.5.11.1 (L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One 1 Pass
2.5.11.2 (L1) Configure 'Access this computer from the network' 0 Fail
2.5.11.3 (L1) Ensure 'Act as part of the operating system' is set to 'No One' 1 Pass
2.5.11.4 (L1) Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE' 0 Fail
2.5.11.5 (L1) Configure 'Allow log on locally' 0 Fail
2.5.11.6 (L1) Configure 'Allow log on through Remote Desktop Services' 1 Pass
2.5.11.7 (L1) Ensure 'Back up files and directories' is set to 'Administrators' 0 Fail
2.5.11.8 (L1) Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE' 1 Pass
2.5.11.9 (L1) Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE' 1 Pass
2.5.11.10 (L1) Ensure 'Create a pagefile' is set to 'Administrators' 1 Pass
2.5.11.11 (L1) Ensure 'Create a token object' is set to 'No One' 1 Pass
2.5.11.12 (L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' 1 Pass
2.5.11.13 (L1) Ensure 'Create permanent shared objects' is set to 'No One 1 Pass
2.5.11.14 (L1) Configure 'Create symbolic links' 1 Pass
2.5.11.15 (L1) Ensure 'Debug programs' is set to 'Administrators 1 Pass
2.5.11.16 (L1) Configure 'Enable computer and user accounts to be trusted for delegation' 1 Pass
2.5.11.17 (L1) Ensure 'Force shutdown from a remote system' is set to 'Administrators' 1 Pass
2.5.11.18 (L1) Configure 'Impersonate a client after authentication' 0 Fail
2.5.11.19 (L1) Ensure 'Increase scheduling priority' is set to 'Administrators' 1 Pass
2.5.11.20 (L1) Ensure 'Load and unload device drivers' is set to 'Administrators' 1 Pass
2.5.11.21 (L1) Ensure 'Lock pages in memory' is set to 'No One' 1 Pass
2.5.11.22 (L1) Ensure 'Modify an object label' is set to 'No One' 1 Pass
2.5.11.23 (L1) Ensure 'Modify firmware environment values' is set to 'Administrators' 1 Pass
2.5.11.24 (L1) Ensure 'Perform volume maintenance tasks' is set to 'Administrators' 1 Pass
2.5.11.25 (L1) Ensure 'Profile single process' is set to 'Administrators' 1 Pass
2.5.11.26 (L1) Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost' 1 Pass
2.5.11.27 (L1) Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE' 0 Fail
2.5.11.28 (L1) Ensure 'Restore files and directories' is set to 'Administrators' 0 Fail
2.5.11.29 (L1) Ensure 'Shut down the system' is set to 'Administrators 0 Fail

Copyright NNT 2017 Page 11


2.5.11.30 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators' 1 Pass
2.5.12 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Security Options
Rule Name Score Pass / Fail
2.5.12.1 (L1) Ensure 'Accounts: Administrator account status' is set to 'Disabled' 0 Fail
2.5.12.2 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts' 0 Fail
2.5.12.3 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' 1 Pass
2.5.12.4 (L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled' 1 Pass
2.5.12.5 (L1) Configure 'Accounts: Rename administrator account' 0 Fail
2.5.12.6 (L1) Configure 'Accounts: Rename guest account' 0 Fail
2.5.13 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Devices Rules
Rule Name Score Pass / Fail
2.5.13.1 (L1) Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators' 0 Fail
2.5.13.2 (L1) Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled' 1 Pass
2.5.14 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Domain member Rules
Rule Name Score Pass / Fail
2.5.14.1 (L1) Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled' 1 Pass
2.5.14.2 (L1) Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled' 1 Pass
2.5.14.3 (L1) Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled' 1 Pass
2.5.14.4 (L1) Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled' 1 Pass
2.5.14.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' 1 Pass
2.5.14.6 (L1) Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled' 1 Pass
2.5.15 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Interactive logon Rules
Rule Name Score Pass / Fail
2.5.15.1 (L1) Ensure 'Interactive logon: Do not display last user name' is set to 'Enabled' 0 Fail
2.5.15.2 (L1) Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled' 1 Pass
2.5.15.3 (L1) Configure 'Interactive logon: Message text for users attempting to log on' (CCE Reference : CCE-37226-8) 0 Fail
2.5.15.4 (L1) Configure 'Interactive logon: Message title for users attempting to log on' (CCE Reference : CCE-37512-1) 0 Fail
2.5.15.5 (L2) Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to '4 or 0 Fail
2.5.15.6 (L1) Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days' 1 Pass
2.5.15.7 (L1) Ensure 'Interactive logon: Require Domain Controller Authentication to unlock workstation' is set to 'Enabled' (MS only) 0 Fail
2.5.15.8 (L1) Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher 0 Fail
2.5.16 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Microsoft network client Rules
Rule Name Score Pass / Fail
2.5.16.1 (L1) Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled' 0 Fail
2.5.16.2 (L1) Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled' 1 Pass
2.5.16.3 (L1) Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled' 1 Pass
2.5.17 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Microsoft network server Rule
Rule Name Score Pass / Fail
2.5.17.1 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled' 0 Fail
2.5.17.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled' 0 Fail
2.5.17.3 (L1) Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or highe 0 Fail

Copyright NNT 2017 Page 12


Copyright NNT 2017 Page 13
2.5.18 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - MSS Rules
Rule Name Score Pass / Fail
2.5.18.1 (L1) Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled' 0 Fail
2.5.18.2 (L1) Ensure 'MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)' is se 0 Fail
2.5.18.3 (L1) Ensure 'MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)' is set to 'E 0 Fail
2.5.18.4 (L1) Ensure 'MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes' is set to 'Disabled' 0 Fail
2.5.18.5 (L2) Ensure 'MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds' is set to 'Enabled: 300,000 or 5 m 0 Fail
2.5.18.6 (L1) Ensure 'MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from 0 Fail
2.5.18.7 (L2) Ensure 'MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to 0 Fail
2.5.18.8 (L1) Ensure 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)' is set to 'Enabled' 0 Fail
2.5.18.9 (L2) Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'En 0 Fail
2.5.18.10 (L2) Ensure 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted' is set to 'Enable 0 Fail
2.5.18.11 (L1) Ensure 'MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warn 0 Fail
2.5.19 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Recovery console Rules
Rule Name Score Pass / Fail
2.5.19.1 Set 'Recovery console: Allow automatic administrative logon' to 'Disabled' 1 Pass
2.5.19.2 Set 'Recovery console: Allow floppy copy and access to all drives and all folders' to 'Disabled' 1 Pass
2.5.20 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Shutdown Rules
Rule Name Score Pass / Fail
2.5.20.1 (L1) Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled' 1 Pass
2.5.21 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - System objects Rules
Rule Name Score Pass / Fail
2.5.21.1 (L1) Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled' (CCE Reference : C 1 Pass
2.5.21.2 (L1) Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabl 1 Pass
3 Protect Cardholder Data: Requirement 3: Protect stored cardholder data
3.1 Requirement 3: Protect stored cardholder data: Render PAN unreadable anywhere it is stored (including on portable digital media
3.1.1 Requirement 3: Protect stored cardholder data: Render stored PANs unreadable
Rule Name Score Pass / Fail
3.1.1.1 Verify that Cardholder Data Encryption and Tokenization measures are in place (Rule not automatically assessed) 1 Pass

4 Protect Cardholder Data: Requirement 4: Encrypt transmission of cardholder data across open networks
4.1 Requirement 4: Use strong cryptography and security protocols (for example, TLS, IPSEC, SSH, etc.) to safeguard sensitive card
4.1.1 Requirement 4: Encrypt transmission of cardholder data: Use strong cryptography and security protocols
Rule Name Score Pass / Fail
4.1.1.1 (L2) Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User is prompte 0 Fail
4.1.1.2 Set 'System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing' to 'Enabled' 0 Fail
4.1.1.3 (L1) Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM&NTLM' 0 Fail
4.1.1.4 (L1) Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher 1 Pass
4.1.1.5 (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Requi 0 Fail
4.1.1.6 (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to 'Requ 0 Fail
4.1.1.7 (L1) Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled' 1 Pass

Copyright NNT 2017 Page 14


5 Maintain a Vulnerability Management Program: Requirement 5: Protect all systems against malware
5.1 Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs
5.1.1 Requirement 5: Anti-Virus Protection Check
Rule Name Score Pass / Fail
5.1.1.1 Verify Virus Protection is enabled and updated 1 Pass

5.1.2 Requirement 5: Protect all systems against malware: Early Launch Antimalware Rules
Rule Name Score Pass / Fail
5.1.2.1 (L1) Ensure 'Boot-Start Driver Initialization Policy' is set to 'Enabled: Good, unknown and bad but critical' 0 Fail
5.1.3 Requirement 5: Protect all systems against malware: Attachment Rules
Rule Name Score Pass / Fail
5.1.3.1 (L1) Ensure 'Notify antivirus programs when opening attachments' is set to 'Enabled' 0 Fail
6 Maintain a Vulnerability Management Program: Requirement 6: Develop and maintain secure systems and applications
6.1 Requirement 6: Develop and maintain secure systems and applications
6.1.1 Requirement 6: Develop and maintain secure systems and applications - Windows Update Rules
Rule Name Score Pass / Fail
6.1.1.1 (L1) Ensure 'Configure Automatic Updates' is set to 'Enabled' 0 Fail
6.1.1.2 (L1) Ensure 'Configure Automatic Updates: Scheduled install day' is set to '0 - Every day' 0 Fail
6.1.1.3 Set 'Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box' to 'Disabled' 0 Fail
6.1.1.4 Set 'Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box' to 'Disabled' 0 Fail
6.1.1.5 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled' 0 Fail
6.1.1.6 Set 'Reschedule Automatic Updates scheduled installations' to 'Enabled:1 minute' 0 Fail
6.1.1.7 (L1) Ensure 'Select when Feature Updates are received' is set to 'Enabled: Current Branch for Business, 180 days' 0 Fail
6.1.1.8 (L1) Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days' 0 Fail
7 Implement Strong Access Control Measures: Requirement 7: Restrict access to cardholder data by business need to know
7.1 Requirement 7: Requirement 7: Restrict access to cardholder data by business need to know: Restriction of access to privileged u
7.1.1 Requirement 7: Restrict access to cardholder data by business need to know - Network Access Rules
Rule Name Score Pass / Fail
7.1.1.1 (L1) Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled' 1 Pass
7.1.1.2 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (MS only) 1 Pass
7.1.1.3 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (MS only 0 Fail
7.1.1.4 (L2) Ensure 'Network access: Do not allow storage of passwords and credentials for network authentication' is set to 'Enabled' 0 Fail
7.1.1.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled' 1 Pass
7.1.1.6 (L1) Configure 'Network access: Named Pipes that can be accessed anonymously' 1 Pass
7.1.1.7 (L1) Configure 'Network access: Remotely accessible registry paths' 1 Pass
7.1.1.8 (L1) Configure 'Network access: Remotely accessible registry paths and sub-paths' 1 Pass
7.1.1.9 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' 1 Pass
7.1.1.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access 0 Fail
7.1.1.11 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' 1 Pass
7.1.1.12 (L1) Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as th 1 Pass

Copyright NNT 2017 Page 15


7.1.2 Requirement 7: Restrict access to cardholder data by business need to know - Network Security Rules
Rule Name Score Pass / Fail
7.1.2.1 (L1) Ensure 'Do not display network selection UI' is set to 'Enabled 0 Fail
7.1.2.2 (L1) Ensure 'Do not enumerate connected users on domain-joined computers' is set to 'Enabled 0 Fail
7.1.2.3 (L1) Ensure 'Enumerate local users on domain-joined computers' is set to 'Disabled 0 Fail
7.1.2.4 (L1) Ensure 'Configure Offer Remote Assistance' is set to 'Disabled' 0 Fail
7.1.2.5 (L1) Ensure 'Configure Solicited Remote Assistance' is set to 'Disabled' 0 Fail
7.1.2.6 (L1) Ensure 'Enable RPC Endpoint Mapper Client Authentication' is set to 'Enabled' (MS only) 0 Fail
7.1.2.7 (L2) Ensure 'Restrict Unauthenticated RPC clients' is set to 'Enabled: Authenticated' (MS only) 0 Fail
7.1.2.8 (L1) Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to 'Enabled' 0 Fail
7.1.2.9 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled 0 Fail
7.1.2.10 (L1) Ensure 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' is set to 'Disab 0 Fail
7.1.2.11 (L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'RC4_HMAC_MD5, AES128_HMAC 0 Fail
7.1.2.12 (L2) Ensure 'Support device authentication using certificate' is set to 'Enabled: Automatic' 0 Fail
7.1.2.13 (L1) Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled 1 Pass
7.1.2.14 (L1) Configure 'Deny access to this computer from the network' 0 Fail
7.1.2.15 (L1) Ensure 'Deny log on as a batch job' to include 'Guests' 0 Fail
7.1.2.16 (L1) Ensure 'Deny log on as a service' to include 'Guests' 0 Fail
7.1.2.17 (L1) Ensure 'Deny log on locally' to include 'Guests' 0 Fail
7.1.2.18 (L1) Ensure 'Deny log on through Remote Desktop Services' to include 'Guests, Local account 0 Fail
7.1.2.19 (L1) Set 'NetBIOS node type' to 'P-node' (Ensure NetBT Parameter 'NodeType' is set to '0x2 (2)') (MS Only) 0 Fail
7.1.2.20 (L1) Ensure 'Turn off multicast name resolution' is set to 'Enabled' (MS Only) 0 Fail
7.1.2.21 (L2) Ensure 'Enable Font Providers' is set to 'Disabled' 0 Fail
7.1.2.22 (L1) Ensure 'Enable insecure guest logons' is set to 'Disabled 0 Fail
7.1.2.23 (L2) Ensure 'Turn on Mapper I/O (LLTDIO) driver' is set to 'Disabled' 0 Fail
7.1.2.24 (L2) Ensure 'Turn on Responder (RSPNDR) driver' is set to 'Disabled 0 Fail
7.1.2.25 (L2) Ensure 'Turn off Microsoft Peer-to-Peer Networking Services' is set to 'Enabled' 0 Fail
7.1.2.26 (L1) Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled' 0 Fail
7.1.2.27 (L1) Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set to 'Enabled 0 Fail
7.1.2.28 (L1) Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled 0 Fail
7.1.2.29 (L2) Ensure 'Microsoft Support Diagnostic Tool: Turn on MSDT interactive communication with support provider' is set to 'Dis 0 Fail
7.1.2.30 (L2) Ensure 'Enable/Disable PerfTrack' is set to 'Disabled' 0 Fail
7.1.2.31 (L1) Ensure 'Use enhanced anti-spoofing when available' is set to 'Enabled 0 Fail
7.1.2.32 (L2) Ensure 'Restrict Remote Desktop Services users to a single Remote Desktop Services session' is set to 'Enabled' (CCE 0 Fail
7.1.2.33 (L1) Ensure 'Prevent downloading of enclosures' is set to 'Enabled 0 Fail

8 Implement Strong Access Control Measures: Requirement 8: Identify and authenticate access to system components
8.1 Requirement 8: Identify and authenticate access to system components: Restrict access to cardholder data by business need to k
8.1.1 Requirement 8: Identify and authenticate access to system components - Account Lockout Rules
Rule Name Score Pass / Fail
8.1.1.1 (L1) Ensure 'Account lockout threshold' is set to '10 or fewer invalid logon attempt(s), but not 0' 0.5 Fail
8.1.1.2 (L1) Ensure 'Account lockout duration' is set to '15 or more minute(s)' 0 Fail
8.1.1.3 (L1) Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)' 0 Fail
8.1.1.4 (L1) Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled 1 Pass
8.1.1.5 (L1) Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled 1 Pass
8.1.1.6 (L1) Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not 0' 0.5 Fail

Copyright NNT 2017 Page 16


8.1.1.7 (L1) Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s 1 Pass
8.1.1.8 (L1) Ensure 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recomme 0 Fail
8.1.2 Requirement 8: Identify and authenticate access to system components - Password Policy
Rule Name Score Pass / Fail
8.1.2.1 (L1) Ensure 'Enforce password history' is set to '24 or more password(s)' 0 Fail
8.1.2.2 (L1) Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' 1 Pass
8.1.2.3 (L1) Ensure 'Minimum password age' is set to '1 or more day(s)' 0 Fail
8.1.2.4 (L1) Ensure 'Minimum password length' is set to '14 or more character(s)' 0 Fail
8.1.2.5 (L1) Ensure 'Password must meet complexity requirements' is set to 'Enabled' 1 Pass
8.1.2.6 (L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled' 1 Pass
8.1.3 Requirement 8: Identify and authenticate access to system components - Windows Logon Options Rules
Rule Name Score Pass / Fail
8.1.3.1 (L1) Ensure 'Sign-in last interactive user automatically after a system-initiated restart' is set to 'Disabled' 1 Pass
8.1.4 Requirement 8: Identify and authenticate access to system components - Windows Remote Management (WinRM)-WinRM Clie
Rule Name Score Pass / Fail
8.1.4.1 (L1) Ensure 'Allow Basic authentication' is set to 'Disabled' 0 Fail
8.1.4.2 (L1) Ensure 'Allow unencrypted traffic' is set to 'Disabled' 0 Fail
8.1.4.3 (L1) Ensure 'Disallow Digest authentication' is set to 'Enabled' 0 Fail
8.1.4.4 (L1) Ensure 'Allow Basic authentication' is set to 'Disabled' 0 Fail
8.1.4.5 (L2) Ensure 'Allow remote server management through WinRM' is set to 'Disabled' 0 Fail
8.1.4.6 (L1) Ensure 'Allow unencrypted traffic' is set to 'Disabled' 0 Fail
8.1.4.7 (L1) Ensure 'Disallow WinRM from storing RunAs credentials' is set to 'Enabled' 0 Fail
8.1.5 Requirement 8: Identify and authenticate access to system components - Remote Desktop Rules
Rule Name Score Pass / Fail
8.1.5.1 (L1) Ensure 'Do not allow passwords to be saved' is set to 'Enabled' 0 Fail
8.1.5.2 (L1) Ensure 'Do not allow drive redirection' is set to 'Enabled' 0 Fail
8.1.5.3 (L1) Ensure 'Always prompt for password upon connection' is set to 'Enabled' 0 Fail
8.1.5.4 (L1) Ensure 'Set client connection encryption level' is set to 'Enabled: High Level' 0 Fail
8.1.5.5 (L2) Ensure 'Do not allow COM port redirection' is set to 'Enabled' 0 Fail
8.1.5.6 (L2) Ensure 'Do not allow LPT port redirection' is set to 'Enabled' 0 Fail
8.1.5.7 (L2) Ensure 'Do not allow supported Plug and Play device redirection' is set to 'Enabled' 0 Fail
8.1.5.8 (L1) Ensure 'Require secure RPC communication' is set to 'Enabled' 0 Fail
8.1.5.9 (L2) Ensure 'Set time limit for active but idle Remote Desktop Services sessions' is set to 'Enabled: 15 minutes or less' 0 Fail
8.1.5.10 (L2) Ensure 'Set time limit for disconnected sessions' is set to 'Enabled: 1 minute' 0 Fail
8.1.5.11 (L1) Ensure 'Do not delete temp folders upon exit' is set to 'Disabled' 0 Fail
8.1.5.12 (L1) Ensure 'Do not use temporary folders per session' is set to 'Disabled' 0 Fail

9 Maintain a Vulnerability Management Program: Requirement 9: Restrict physical access to cardholder data
9.1 Requirement 9: Restrict physical access to cardholder data: Physical Protection procedures and measures
9.1.1 Requirement 9: Restrict physical access to cardholder data: Physical Protection procedures and measures
Rule Name Score Pass / Fail
9.1.1.1 Verify PCI DSS Requirement 9 requirements are being operated (Rule not automatically assessed) 1 Pass

Copyright NNT 2017 Page 17


10 Regularly Monitor and Test Networks: Requirement 10: Track and monitor all access to network resources and cardholde
10.1 Requirement 10: Track access to network/cardholder data: Retain and Review System Audit Trails
10.1.1 Requirement 10: Track access to network/cardholder data: Account Policies - Audit Rules
Rule Name Score Pass / Fail
10.1.1.1 (L1) Configure 'Manage auditing and security log' 1 Pass
10.1.1.2 (L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE' 0 Fail
10.1.1.3 (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings 0 Fail
10.1.1.4 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' 1 Pass
10.1.2 Requirement 10: Track access to network/cardholder data: Windows Components - Event Log Rules
Rule Name Score Pass / Fail
10.1.2.1 (L1) Ensure 'Application: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' 0 Fail
10.1.2.2 (L1) Ensure 'Application: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' 0 Fail
10.1.2.3 (L1) Ensure 'Security: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' 0 Fail
10.1.2.4 (L1) Ensure 'Security: Specify the maximum log file size (KB)' is set to 'Enabled: 196,608 or greater' 0 Fail
10.1.2.5 (L1) Ensure 'Setup: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' 0 Fail
10.1.2.6 (L1) Ensure 'Setup: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' 0 Fail
10.1.2.7 (L1) Ensure 'System: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' 0 Fail
10.1.2.8 (L1) Ensure 'System: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' 0 Fail
10.1.3 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - System Rules
Rule Name Score Pass / Fail
10.1.3.1 (L1) Ensure 'Audit System Integrity' is set to 'Success and Failure' 1 Pass
10.1.3.2 (L1) Ensure 'Audit Security System Extension' is set to 'Success and Failure' 0 Fail
10.1.3.3 (L1) Ensure 'Audit Security State Change' is set to 'Success' (CCE Reference : CCE-38114-5) 1 Pass
10.1.3.4 (L1) Ensure 'Audit IPsec Driver' is set to 'Success and Failure' 0 Fail
10.1.3.5 (L1) Ensure 'Audit Other System Events' is set to 'Success and Failure' 1 Pass
10.1.4 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Object Access Rules
Rule Name Score Pass / Fail
10.1.4.1 Set 'Audit Policy: Object Access: Handle Manipulation' to 'No Auditing' 1 Pass
10.1.4.2 Set 'Audit Policy: Object Access: Other Object Access Events' to 'No Auditing' 1 Pass
10.1.4.3 Set 'Audit Policy: Object Access: File Share' to 'No Auditing' 1 Pass
10.1.4.4 Set 'Audit Policy: Object Access: File System' to 'No Auditing' 1 Pass
10.1.4.5 Set 'Audit Policy: Object Access: SAM' to 'No Auditing' 1 Pass
10.1.4.6 Set 'Audit Policy: Object Access: Kernel Object' to 'No Auditing' 1 Pass
10.1.4.7 Set 'Audit Policy: Object Access: Filtering Platform Packet Drop' to 'No Auditing' 1 Pass
10.1.4.8 Set 'Audit Policy: Object Access: Registry' to 'No Auditing' 1 Pass
10.1.4.9 Set 'Audit Policy: Object Access: Certification Services' to 'No Auditing' 1 Pass
10.1.4.10 Set 'Audit Policy: Object Access: Application Generated' to 'No Auditing' 1 Pass
10.1.4.11 Set 'Audit Policy: Object Access: Detailed File Share' to 'No Auditing' 1 Pass
10.1.4.12 Set 'Audit Policy: Object Access: Filtering Platform Connection' to 'No Auditing' 1 Pass
10.1.4.13 (L1) Ensure 'Audit Removable Storage' is set to 'Success and Failure' 0 Fail

Copyright NNT 2017 Page 18


10.1.5 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Logon-Logoff Rules
Rule Name Score Pass / Fail
10.1.5.1 (L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure' 0 Fail
10.1.5.2 (L1) Ensure 'Audit Special Logon' is set to 'Success' 1 Pass
10.1.5.3 Set 'Audit Policy: Logon-Logoff: IPsec Main Mode' to 'No Auditing' 1 Pass
10.1.5.4 (L1) Ensure 'Audit Account Lockout' is set to 'Success and Failure' 0 Fail
10.1.5.5 (L1) Ensure 'Audit Group Membership' is set to 'Success' 0 Fail
10.1.5.6 Set 'Audit Policy: Logon-Logoff: IPsec Extended Mode' to 'No Auditing' 1 Pass
10.1.5.7 Set 'Audit Policy: Logon-Logoff: IPsec Quick Mode' to 'No Auditing' 1 Pass
10.1.5.8 (L1) Ensure 'Audit Logoff' is set to 'Success' 1 Pass
10.1.5.9 Set 'Audit Policy: Logon-Logoff: Network Policy Server' to 'No Auditing' 0 Fail
10.1.5.10 (L1) Ensure 'Audit Logon' is set to 'Success and Failure' 1 Pass
10.1.6 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - DS Access Rules
Rule Name Score Pass / Fail
10.1.6.1 Set 'Audit Policy: DS Access: Directory Service Replication' to 'No Auditing' 1 Pass
10.1.6.2 Set 'Audit Policy: DS Access: Detailed Directory Service Replication' to 'No Auditing' 1 Pass
10.1.6.3 Set 'Audit Policy: DS Access: Directory Service Changes' to 'No Auditing' 1 Pass
10.1.6.4 Set 'Audit Policy: DS Access: Directory Service Access' to 'No Auditing' 0 Fail

10.1.7 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Detailed Tracking Rules
Rule Name Score Pass / Fail
10.1.7.1 Set 'Audit Policy: Detailed Tracking: DPAPI Activity' to 'No Auditing' 1 Pass
10.1.7.2 Set 'Audit Policy: Detailed Tracking: Process Termination' to 'No Auditing' 1 Pass
10.1.7.3 (L1) Ensure 'Audit PNP Activity' is set to 'Success' 0 Fail
10.1.7.4 (L1) Ensure 'Audit Process Creation' is set to 'Success' (CCE Reference : CCE-36059-4) 0 Fail
10.1.7.5 Set 'Audit Policy: Detailed Tracking: RPC Events' to 'No Auditing' 1 Pass
10.1.8 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Policy Change Rules
Rule Name Score Pass / Fail
10.1.8.1 Set 'Audit Policy: Policy Change: MPSSVC Rule-Level Policy Change' to 'No Auditing' 1 Pass
10.1.8.2 Set 'Audit Policy: Policy Change: Filtering Platform Policy Change' to 'No Auditing' 1 Pass
10.1.8.3 (L1) Ensure 'Audit Authorization Policy Change' is set to 'Success' 0 Fail
10.1.8.4 (L1) Ensure 'Audit Audit Policy Change' is set to 'Success and Failure' 0 Fail
10.1.8.5 Set 'Audit Policy: Policy Change: Other Policy Change Events' to 'No Auditing' 1 Pass
10.1.8.6 (L1) Ensure 'Audit Authentication Policy Change' is set to 'Success' 1 Pass
10.1.9 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Account Management Rules
Rule Name Score Pass / Fail
10.1.9.1 Set 'Audit Policy: Account Management: Distribution Group Management' to 'No Auditing' 1 Pass
10.1.9.2 (L1) Ensure 'Audit Computer Account Management' is set to 'Success and Failure' 0 Fail
10.1.9.3 (L1) Ensure 'Audit User Account Management' is set to 'Success and Failure' 0 Fail
10.1.9.4 (L1) Ensure 'Audit Security Group Management' is set to 'Success and Failure' 0 Fail
10.1.9.5 (L1) Ensure 'Audit Other Account Management Events' is set to 'Success and Failure' 0 Fail
10.1.9.6 (L1) Ensure 'Audit Application Group Management' is set to 'Success and Failure' 0 Fail

Copyright NNT 2017 Page 19


Copyright NNT 2017 Page 20
10.1.10 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Account Logon Rules
Rule Name Score Pass / Fail
10.1.10.1 Set 'Audit Policy: Account Logon: Kerberos Authentication Service' to 'No Auditing' 0 Fail
10.1.10.2 Set 'Audit Policy: Account Logon: Other Account Logon Events' to 'No Auditing' 1 Pass
10.1.10.3 Set 'Audit Policy: Account Logon: Kerberos Service Ticket Operations' to 'No Auditing' 0 Fail
10.1.10.4 (L1) Ensure 'Audit Credential Validation' is set to 'Success and Failure' 0 Fail

10.1.11 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Privilege Use Rules
Rule Name Score Pass / Fail
10.1.11.1 Set 'Audit Policy: Privilege Use: Other Privilege Use Events' to 'No Auditing' 1 Pass
10.1.11.2 Set 'Audit Policy: Privilege Use: Non Sensitive Privilege Use' to 'No Auditing' 1 Pass
10.1.11.3 (L1) Ensure 'Audit Sensitive Privilege Use' is set to 'Success and Failure' 0 Fail

11 Regularly Monitor and Test Networks: Requirement 11: Regularly test security systems and processes
11.1 Requirement 11: Regularly test security systems and processes
11.1.1 Requirement 11: Regularly test security systems and processes: 11.5 Deploy a change-detection mechanism (for example, file
Rule Name Score Pass / Fail
11.1.1.1 Implement File Integrity Monitoring: Verify the use of a change-detection mechanism within the cardholder data environment 1 Pass

12 Maintain an Information Security Policy: Requirement 12: Maintain a policy that addresses information security for all per
12.1 Requirement 12: Maintain a policy that addresses information security for all personnel
12.1.1 Requirement 12: Maintain a policy that addresses information security for all personnel: Policy and Procedure Documentation
Rule Name Score Pass / Fail
12.1.1.1 Verify PCI DSS Requirement 12 requirements are being operated 1 Pass

Copyright NNT 2017 Page 21

Das könnte Ihnen auch gefallen