Sie sind auf Seite 1von 9

3.1.1.

1 Ensure 'Enforce password history' is set to '24 or more password(s)'


The recommended state for this setting is: 24 or more password(s).
Computer Configuration\Policies\Windows Settings\Security Settings\Account
Policies\Password Policy\Enforce password history
Default Value:
24 passwords remembered on domain members. 0 passwords remembered on stand-alone
workstations.

3.1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'
The recommended state for this setting is 60 or fewer days, but not 0.
Computer Configuration\Policies\Windows Settings\Security Settings\Account
Policies\Password Policy\Maximum password age
Default Value:
42 days.

3.1.1.3 Ensure 'Minimum password length' is set to '14 or more character(s)'


The recommended state for this setting is: 14 or more character(s).
Computer Configuration\Policies\Windows Settings\Security Settings\Account
Policies\Password Policy\Minimum password length
Default Value:
7 characters on domain members. 0 characters on stand-alone workstations.

3.1.1.4 Ensure 'Password must meet complexity requirements' is set to 'Enabled'


The recommended state for this setting is: Enabled.
Computer Configuration\Policies\Windows Settings\Security Settings\Account
Policies\Password Policy\Password must meet complexity requirements
Default Value:
Enabled on domain members. Disabled on stand-alone workstations.

3.1.1.5 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'


The recommended state for this setting is: Disabled.
Computer Configuration\Policies\Windows Settings\Security Settings\Account
Policies\Password Policy\Store passwords using reversible encryption
Default Value:
Disabled.

3.1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'


The recommended state for this setting is: 15 or more minute(s).
Computer Configuration\Policies\Windows Settings\Security Settings\Account
Policies\Account Lockout Policy\Account lockout duration
Default Value:
None, because this policy setting only has meaning when an Account lockout
threshold is
specified. When an Account lockout threshold is configured, Windows automatically
suggests a
value of 30 minutes.

3.1.2.2 Ensure 'Account lockout threshold' is set to '1 0 or fewer invalid logon
attempt(s),but not 0'
The recommended state for this setting is: 10 or fewer invalid logon attempt(s),
but not 0.
Computer Configuration\Policies\Windows Settings\Security Settings\Account
Policies\Account Lockout Policy\Account lockout threshold
Default Value:
0 failed logon attempts.

3.1.2.3 Ensure 'Reset account lockout counter after' is set to '15 or


Computer Configuration\Policies\Windows Settings\Security Settings\Account
Policies\Account Lockout Policy\Reset account lockout counter after
Default Value:
None, because this policy setting only has meaning when an Account lockout
threshold is
specified. When an Account lockout threshold is configured, Windows automatically
suggests a
value of 30 minutes.

3.2.2.1.1 Ensure 'Accounts: Administrator account status' is set to 'Disabled'


The recommended state for this setting is: Disabled.

Computer Configuration\Policies\Windows Settings\Security Settings\Local


Policies\Security Options\Accounts: Administrator account status
Default Value:
Disabled.

3.2.2.1.5 Configure 'Accounts: Rename administrator account' (existe aussi pour


guest)
Computer Configuration\Policies\Windows Settings\Security Settings\Local
Policies\Security Options\Accounts: Rename administrator account
Default Value:
Administrator.

3.2.2.8.6 Ensure 'Network access: Named Pipes that can be accessed anonymously' is
set to 'None'
Description:
This policy setting determines which communication sessions, or pipes, will have
attributes and
permissions that allow anonymous access.
The recommended state for this setting is: <blank> (i.e. None).
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
HKEY _LOCAL_MACHI N E\SYSTEM\CurrentControiSet\Services\LanManServer\Parameters:
NuIISessionPipes
Remediation:
To establish the recommended configuration via GP, set the following Ul path to
<blank> (i.e.
None):
Computer Configuration\Policies\Windows Settings\Security Settings\Local
Policies\Security Options\Network access: Named Pipes that can be accessed
anonymously

Default Value:
None.

3.2.2.8.9 Ensure 'Network access: Restrict anonymous access to Named Pipes and
Shares' is set to 'Enabled'
Description:
When enabled, this policy setting restricts anonymous access to only those shares
and pipes
that are named in the Network access: Named pipes that can be accessed anonymously
and
Network access: Shares that can be accessed anonymously settings. This policy
setting
controls null session access to shares on your computers by adding
RestrictNuiiSessAccess
with the value 1 in the
HKEY\LOCAL \MACH I NE\System\CurrentControiSet\Services\LanManServer\Parameters
registry key. This registry value toggles null session shares on or off to control
whether the
server service restricts unauthenticated clients' access to named resources.
The recommended state for this setting is: Enabled.
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
HKEY _LOCAL_MACHI N E\SYSTEM\CurrentControiSet\Services\LanManServer\Parameters: Re
strictN uiiSessAccess
Remediation:
To establish the recommended configuration via GP, set the following Ul path to
Enabled:
Computer Configuration\Policies\Windows Settings\Security Settings\Local
Policies\Security
Options\Network access: Restrict anonymous access to Named Pipes and Shares
Default Value:
Enabled. (Anonymous access is restricted to shares and pipes listed in the Network
access:
Named pipes that can be accessed

3.2.2.12 User Account Control PAge 204 à 220

3.2.2.12.7 Ensure 'User Account Control: Run all administrators in Admin Approval
Mode'is set to 'Enabled'
HKEY _LOCAL_MACHI N E\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System:
EnableLUA
Default Value:
Enabled. (Admin Approval Mode is enabled. This policy must be enabled and related
UAC
policy settings must also be set appropriately to allow the built-in Administrator
account and all other users who are members of the Administrators group to run in
Admin Approval Mode.)

3.3.8 Ensure 'liS Admin Service (IISADMIN)' is set to 'Disabled' or 'Not Installed'
Description:
Enables the server to administer the liS metabase. The liS metabase stores
configuration for
the SMTP and FTP services.
The recommended state for this setting is: Disabled or Not Installed.
Note: This service is not installed by default. It is supplied with Windows, but is
installed by
enabling an optional Windows feature (Internet Information Services).
Note #2: An organization may choose to selectively grant exceptions to web
developers to allow
liS (or another web server) on their workstation, in order for them to locally test
& develop web
pages. However, the organization should track those machines and ensure the
security controls
and mitigations are kept up to date, to reduce risk of compromise.
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
I HKEY LOCAL MACHIN E\SYSTEM\CurrentControiSet\Services\IISADM IN :Start
Remediation:
To establish the recommended configuration via GP, set the following Ul path to:
Disabled or
ensure the service is not installed.
Computer Configuration\Policies\Windows Settings\Security Settings\System
Services\IIS
Admin Service
Default Value:
Not Installed (Automatic when installed)

3.3.13 Ensure 'Microsoft FTP Service (FTPSVC)' is set to 'Disabled' or 'Not


Installed'
Description:
Enables the server to be a File Transfer Protocol (FTP) server.
The recommended state for this setting is: Disabled or Not Installed.
Note: This service is not installed by default. It is supplied with Windows, but is
installed by
enabling an optional Windows feature (Internet Information Services- FTP Server).
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
I HKEY LOCAL MACHINE\SYSTEM\CurrentControiSet\Services\FTPSVC:Start
Remediation:
To establish the recommended configuration via GP, set the following Ul path to:
Disabled or
ensure the service is not installed.
Computer Configuration\Policies\Windows Settings\Security Settings\System
Services\Microsoft
FTP Service
Default Value:
Not Installed (Automatic when installed)

3.3.27 Ensure 'Server (LanmanServer)' is set to 'Disabled' (Recommended)


Description:
Supports file, print, and named-pipe sharing over the network for this computer. If
this service is
stopped, these functions will be unavailable.
The recommended state for this setting is: Disabled.
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
I HKEY LOCAL MACHINE\SYSTEM\CurrentControiSet\Services\LanmanServer:Start
Remediation:
To establish the recommended configuration via GP, set the following Ul path to:
Disabled.
I Computer Configuration\Policies\Windows Settings\Security Settings\System
Services\Server
Impact:
File, print and named-pipe sharing functions will be unavailable from this machine
over the
network.
Note: Many remote administration tools, such as System Center Configuration Manager
(SCCM), require the Server service to be operational for remote management. In
addition, many
vulnerability scanners use this service to scan the file system remotely.
Page 258 of 893
Confidential and Proprietary to Beckman Coulter
Effective Date: 05 Jun 2018, InfoCard Number GLB-QS-REF-0094, Revision 1
Vault: QMS-rel, Printed on: 08 Jul 2020, 02:55:18 pm - Printed by: USERMAN
Document: Document#: Revision: 1.0 . BECKMAN Windows 10 Hardening GLB-QS-REF-0094
COULIER
Default Value:
Automatic

3.3.32 Ensure 'Web Management Service (WMSvc)' is set to 'Disabled' or 'Not


Installed'
Description:
The Web Management Service enables remote and delegated management capabilities for
administrators to manage for the Web server, sites and applications present on the
machine.
The recommended state for this setting is: Disabled or Not Installed.
Note: This service is not installed by default. It is supplied with Windows, but is
installed by
enabling an optional Windows feature (Internet Information Services- Web Management
ToolsliS
Management Service).
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
I HKEY LOCAL MACHINE\SYSTEM\CurrentControiSet\Services\WMSvc:Start
Remediation:
To establish the recommended configuration via GP, set the following Ul path to:
Disabled or
ensure the service is not installed.
Computer Configuration\Policies\Windows Settings\Security Settings\System
Services\Web
Management Service

Default Value:
Not Installed (Manual when installed)

3.3.37 Ensure 'Windows Remote Management (WS-Management) (WinRM)' is set to


'Disabled' (Recommended)
Description:
Windows Remote Management (WinRM) service implements the WS-Management protocol for
remote management. WS-Management is a standard web services protocol used for
remote
software and hardware management. The WinRM service listens on the network for
WSManagement
requests and processes them.
The recommended state for this setting is: Disabled.
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
I HKEY LOCAL MACHINE\SYSTEM\CurrentControiSet\Services\WinRM:Start
Remediation:
To establish the recommended configuration via GP, set the following Ul path to:
Disabled.
Computer Configuration\Policies\Windows Settings\Security Settings\System
Services\Windows Remote Management (WS-Management)
Default Value:
Manual

3.3.39 Ensure 'World Wide Web Publishing Service (W3SVC)' is set to 'Disabled' or
'Not
Installed'
Description:
Provides Web connectivity and administration through the Internet Information
Services
Manager.
The recommended state for this setting is: Disabled or Not Installed.
Note: This service is not installed by default. It is supplied with Windows, but is
installed by
enabling an optional Windows feature (Internet Information Services- World Wide Web
Services).
Note #2: An organization may choose to selectively grant exceptions to web
developers to allow
liS (or another web server) on their workstation, in order for them to locally test
& develop web
pages. However, the organization should track those machines and ensure the
security controls
and mitigations are kept up to date, to reduce risk of compromise.
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
I HKEY LOCAL MACHINE\SYSTEM\CurrentControiSet\Services\W3SVC:Start
Remediation:
To establish the recommended configuration via GP, set the following Ul path to:
Disabled or
ensure the service is not installed.
Computer Configuration\Policies\Windows Settings\Security Settings\System
Services\World
Wide Web Publishing Service
Default Value:
Not Installed (Automatic when installed)

3.6.7.9.2.18 (BL) Ensure 'Require additional authentication at startup: Allow


Bitlocker
without a compatible TPM' is set to 'Enabled: False' (Recommended)
Description:
This policy setting allows you to configure whether you can use BitLocker without a
Trusted
Platform Module (TPM), instead using a password or startup key on a USB flash
drive. This
policy setting is applied when you turn on BitLocker.
The recommended state for this setting is: Enabled: False (unchecked).
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
I HKEY LOCAL MACHINE\SOFTWARE\Policies\Microsoft\FVE\EnableBDEWithNoTPM
Remediation:
To establish the recommended configuration via GP, set the following Ul path to
Enabled: False
(unchecked):
Computer Configuration\Policies\Administrative Templates\Windows
Components\BitLocker
Drive Encryption\Operating System Drives\Require additional authentication at
startup: Allow
BitLocker without a compatible TPM
Page 691 of 893
Confidential and Proprietary to Beckman Coulter
Effective Date: 05 Jun 2018, InfoCard Number GLB-QS-REF-0094, Revision 1
Vault: QMS-rel, Printed on: 08 Jul 2020, 02:55:18 pm - Printed by: USERMAN
Document: Document#: Revision: 1.0 . BECKMAN Windows 10 Hardening GLB-QS-REF-0094
COULIER
Impact:
A compatible TPM will be required in order to use BitLocker.
Default Value:
True (checked). (Users can use BitLocker without a compatible TPM by using a
password or
startup key on a USB flash drive.)

3.6.7.9.3.17 (BL) Ensure 'Deny write access to removable drives not protected by
Bitlocker' is set to 'Enabled' (Recommended)
Description:
This policy setting configures whether Bitlocker protection is required for a
computer to be able
to write data to a removable data drive.
All removable data drives that are not Bitlocker-protected will be mounted as read-
only. If the
drive is protected by Bitlocker, it will be mounted with read and write access.
The recommended state for this setting is: Enabled.
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
HKEY _LOCAL_MACHINE\SYSTEM\CurrentControiSet\Policies\Microsoft\FVE\RDVDenyWriteA
ccess
Remediation:
To establish the recommended configuration via GP, set the following Ul path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Windows
Components\Bitlocker
Drive Encryption\Removable Data Drives\Deny write access to removable drives not
protected
by Bitlocker
Impact:
All removable data drives that are not Bitlocker-protected will be mounted as read-
only. If the
drive is protected by Bitlocker, it will be mounted with read and write access.
Page 734 of 893
Confidential and Proprietary to Beckman Coulter
Effective Date: 05 Jun 2018, InfoCard Number GLB-QS-REF-0094, Revision 1
Vault: QMS-rel, Printed on: 08 Jul 2020, 02:55:18 pm - Printed by: USERMAN
Document: Document#: Revision: 1.0 . BECKMAN Windows 10 Hardening GLB-QS-REF-0094
COULIER
Default Value:
Disabled. (All removable data drives on the computer will be mounted with read and
write
access.)

3.6.7.17.1.1 Ensure 'Configure Windows SmartScreen' is set to 'Enabled'


Description:
This policy setting allows you to manage the behavior of Windows SmartScreen.
Windows
SmartScreen helps keep PCs safer by warning users before running unrecognized
programs
downloaded from the Internet. Some information is sent to Microsoft about files and
programs
run on PCs with this feature enabled.
The recommended state for this setting is: Enabled.
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
HKEY _LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System:EnableSmartScree
n
Page 776 of 893
Confidential and Proprietary to Beckman Coulter
Effective Date: 05 Jun 2018, InfoCard Number GLB-QS-REF-0094, Revision 1
Vault: QMS-rel, Printed on: 08 Jul 2020, 02:55:18 pm - Printed by: USERMAN
Document: Document#: Revision: 1.0 . BECKMAN Windows 10 Hardening GLB-QS-REF-0094
COULIER
Remediation:
To establish the recommended configuration via GP, set the following Group Policy
setting to
Enabled:
Computer Configuration\Policies\Administrative Templates\Windows Components\File
Explorer\Configure Windows SmartScreen
Default Value:
Disabled. (Windows SmartScreen behavior is managed by administrators on the PC by
using
Windows SmartScreen Settings in Action Center.)

3.6.7.22.3.5 Temporary folders


This section contains recommendations related to Remote Desktop Session Host
Session
Temporary folders.
3.6.7.22.3.5.1 Ensure 'Do not delete temp folders upon exit' is set to 'Disabled'
Description:
This policy setting specifies whether Remote Desktop Services retains a user's per-
session
temporary folders at logoff.
The recommended state for this setting is: Disabled.
Audit:
Navigate to the Ul Path articulated in the Remediation section and confirm it is
set as
prescribed. This group policy setting is backed by the following registry location:
HKEY _LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NnTerminal
Services:DeleteTempDirsOnExit
Remediation:
To establish the recommended configuration via GP, set the following Ul path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Windows Components\Remote
Desktop Services\Remote Desktop Session Host\Temporary Folders\Do not delete temp
folders
upon exit
Page 820 of 893
Confidential and Proprietary to Beckman Coulter
Effective Date: 05 Jun 2018, InfoCard Number GLB-QS-REF-0094, Revision 1
Vault: QMS-rel, Printed on: 08 Jul 2020, 02:55:18 pm - Printed by: USERMAN
Document: Document#: Revision: 1.0 . BECKMAN Windows 10 Hardening GLB-QS-REF-0094
COULIER
Default Value:
Disabled. (Temporary folders are deleted when a user logs off.)

PAGE 856 WInRM?

PAGE 691

Das könnte Ihnen auch gefallen