Skip to main content

Active Directory Windows

1. Introduction

1.1. Purpose of this Document

This document is intended to guide administrators to secure Active Directory Windows Server 2016. All administrators should use this document for secure configuration.

1.2. Instructions

1.2.1. How to Use This Document

The security settings described in this document shall be configured on the Active Directory Windows Server 2016 by the administrators. All settings can only be done with administrative privileges.

It is strongly recommended that the settings be tested in the staging environment before applying them in the production environment. It is further recommended that the administrators of the Active Directory Windows Server 2016 make note of the original values while changing the settings. For each setting, a detailed description is given, followed by the impact if the setting is not configured and the solution to fix it.

Implementing changes on production systems without first testing them on replica test systems may adversely affect the system/application and may cause it to stop working.

2. Configuration Document: Active Directory

2.1. Account Polices

2.1.1. Password Policy & Account Lockout Policy

Control Statement

Password policies help administrator enforce the strength of passwords that users can set. Password policy is required to control user password characteristics including minimum length, maximum length and password aging. To help prevent password-based attacks from being successful, strong password and account lockout settings need to be configured.

Risk/Impact

The longer a user uses the same password, the greater the chance that an attacker can determine the password through brute force attacks. Risk Rating

High

Implementation Steps

Configure a strong Password and Account policy, as suggested in below table. To configure the policy,

Press Windows key > type Run and type gpedit.msc or rsop.msc.

Expand Computer Configuration > Windows Settings > Security Settings > Account Policy > Password Policy or Account Lockout Policy container and configure the settings as suggested in Appendix 1.

2.2. Local Polices

2.2.1. User Rights Assignments

Control Statement

The user rights settings determine which users or groups have logon rights and other privileges on the server.

Risk/Impact

If an account is given this right the user of the account may create an application that calls into Credential Manager and is returned the credentials for another user.

Risk Rating

Medium

Implementation Steps

Ensure user rights are configured as suggested in below table. To configure Security Options,

Press Windows key > type Run and type gpedit.msc.

Expand Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment container and configure the settings with the values as suggested in Appendix 2.

2.2.2. Security Options

Control Statement

The security option settings include multiple settings that enable or disable security settings for the server, such as digital signing of data, Administrator and guest account names, floppy drive and CD ROM access, driver installation and logon prompts.

Risk/Impact

In some organizations, it can be a daunting management challenge to maintain a regular schedule for periodic password changes for local accounts. Therefore, you may want to disable the built-in Administrator account instead of relying on regular password changes to protect it from attack.

Risk Rating

High

Implementation Steps

Ensure security options are enabled as recommended in below table. To configure security options settings,

Press Windows key > type Run and type gpedit.msc.

Expand Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options and configure the settings with the values as suggested in Appendix 3.

2.3. Windows Firewall with Advanced

2.3.1. Public Profile

Control Statement

Windows Firewall offers three firewall profiles: domain, private and public. The default profile is the public profile, which is used to designate public networks such as Wi-Fi hotspots at coffee shops, airports, and other locations

Risk/Impact

Weak controls can result into unauthorized access to server and network

Risk Rating

Low

Implementation Steps

Ensure the profile parameters must be configured as per ORGANIZATION Public Profile policy. To configure these settings on standalone server:

Click Start > Run and type Gpedit.msc

Expand Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Private Profile and configure the settings with the values as suggested in Appendix 4.

2.3.2. Private Profile

Control Statement

Windows Firewall offers three firewall profiles: domain, private and public. The private profile is a user-assigned profile and is used to designate private or home networks.

Risk/Impact

Weak controls can result into unauthorized access to server and network

Risk Rating

Low

Implementation Steps

Ensure the profile parameters must be configured as per ORGANIZATION Private Profile policy. To configure these settings on standalone server:

Click Start > Run and type Gpedit.msc

Expand Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Private Profile and configure the settings with the values as suggested in Appendix 4.

2.3.3. Domain Profile

Control Statement

Windows Firewall offers three firewall profiles: domain, private and public. The domain profile applies to networks where the host system can authenticate to a domain controller. Risk/Impact

Weak controls can result into unauthorized access to server and network

Risk Rating

Low

Implementation Steps

Ensure the profile parameters must be configured as per ORGANIZATION Domain Profile policy. To configure these settings on standalone server:

Click Start > Run and type Gpedit.msc

Expand Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Private Profile and configure the settings with the values as suggested in Appendix 4.

2.4. Auditing, Logging and Monitoring

2.4.1. Account Policies

Control Statement

The audit entry shows an event or action performed, the user account and the date and time of the action. Security auditing is important for any enterprise server, as audit logs can provide vital information about any security breach.

Risk/Impact

Malicious activity may not be detected if sufficient audit logs are not enabled. Early warning towards attempts at malicious access will go undetected. Risk Rating

High

Implementation Steps

Ensure auditing is enabled as recommended in below table. To configure audit settings,

Press Windows key > type Run and type gpedit.msc.

Expand Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies and configure the settings with the values as suggested in Appendix 5.

2.4.2. Event log Sizes

Control Statement

Event viewer maintains logs about program, security and server events. Event viewer can be used to view and manage the event logs, gather information about hardware and software problems and monitor windows security events.

Risk/Impact

Critical logs may get overwritten in the absence of sufficient event viewer file size. Default value for the log is

20MB

Risk Rating

Medium

Implementation Steps

Ensure that at least 102400 KB (100MB) size is allocated for Application, Security and Server Event Viewer log files. To configure log file size,

Click Start > Run and type eventvwr.msc.

Expand Windows Logs > Right click on Application, choose the Properties and set the Maximum Log Size to any size = or > than 100MB.

Right click on Security, choose the Properties and set the Maximum Log Size to any size = or > than 100MB.

Right click on Server, choose the Properties and set the Maximum Log Size to any size = or > than 100MB.

2.4.3. Permission on Event logs

Control Statement

Event viewer holds the System, Security and Application logs for a Windows server. Unauthorized users can be given access to event logs, by default Guest has read access to event logs.

Risk/Impact

Unauthorized access to event logs may allow users to get important information. Risk Rating

Low

Implementation Steps

To configure permissions on event logs navigate to the following file,

C:\windows\System32\winevt\Application.evtx.

Right click and go to Permissions and remove invalid users. Similarly for \security.evtx and \system.evtx

Ensure that Guest access to event logs is not allowed. To configure the registry key,

Click Start > Run and type regedit. Navigate to the following registry hive,

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\SYSTEM

In the sub keys check Application for the DWORD RestrictGuestAccess. Double click on

RestrictGuestAccess and assign value 1 to restrict guest access. If the DWORD RestrictGuestAccess does not exist it needs to be created. Right click and click New and then click DWORD. Rename the new DWORD to RestrictGuestAccess. Double click on RestrictGuestAccess and assign value of 1 to the RestrictGuestAccess DWORD.

Follow the same procedure for Security and Application sub keys.

2.4.4. Auditing of sensitive system and application files and directories should be enabled for servers

Control Statement

Enable Windows native auditing feature on the following sensitive system and application files and directories:

%systemroot%\

%systemroot%\system32

%systemroot%\system32\drivers

%systemroot%\system32\config

%systemroot%\system32\spool

The recommended guidelines state to audit the following actions for the Everyone group:

Create Files / Write Data - Failure

Create Folders / Append Data - Failure

Delete Subfolders and Files - Failure

Delete - Success and Failure

Change Permissions - Failure

Take Ownership - Failure Risk/Impact

Auditing access to sensitive system and application files and directories increases the chance unauthorized access to the system will be detected and terminated in a timely manner. Risk Rating

Medium

Implementation Steps

Enable Windows native auditing feature on the directories listed in the Technical Control Procedure.

Open Windows Explorer and browse to the appropriate directory;

Locate the folder/file, right click it, and select Properties from the drop down menu;

Select the Security tab;

Click the Advanced button;

Select the Auditing tab;

Click the Continue button if User Account Control is enabled;

Click the Add button then enter the name of the user or group object whose actions to audit;

Click OK and click the appropriate actions and respective success and failure checkboxes;

Click OK three times to confirm changes and close the window; and 10) Repeat steps 2 through 9 for each of the directories listed.

2.4.5. Auditing of sensitive system registry keys should be enabled on servers

Control Statement

Enable Windows native auditing feature on all sensitive system registry keys for servers. These sensitive keys may include:

HKLM\SYSTEM HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\PerfLib

HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon

HKLM\SYSTEM\CurrentControlSet\Control\Lsa

HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers

HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\KnownDLLs

HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg\AllowedPaths

HKLM\SYSTEM\CurrentControlSet\Services\LanManServer\Shares

HKLM\SYSTEM\CurrentControlSet\Services\UPS HKEY_USERS.default

HKLM\SYSTEM\CurrentControlSet\Services\SNMP\Parameters\ValidCommunities

HKLM\SYSTEM\CurrentControlSet\Services\SNMP\Parameters\PermittedManagers

HKLM\SOFTWARE\Policies\SNMP\Parameters\ValidCommunities

HKLM\SOFTWARE\Policies\SNMP\Parameters\PermittedManagers

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx HKCR (all subkeys)

HKLM\SOFTWARE HKLM\SOFTWARE\MICROSOFT\Rpc (and all subkeys)

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\AeDebug

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\Compatibility

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\Drivers

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\Embedding

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\Fonts

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\FontSubstitutes

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\FontDrivers

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\FontMapper

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\GRE_Initialize

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\MCI

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\MCIExtensions

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\Ports (all subkeys)

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\Type1Installer

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\ProfileList

HKLM\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\WOW (all subkeys)

The recommended guidelines state to audit the following actions for the Everyone group:

Set Value - Failure

Create Subkey - Failure

Delete - Success and Failure

Risk/Impact

Auditing access to sensitive system registry keys increases the chance that unauthorized access to the system will be detected and terminated in a timely manner.

Risk Rating

Medium

Implementation Steps

Enable Windows native auditing feature on all sensitive system registry keys for sensitive servers.

Open regedit;

Locate the key, right click it, and select Permissions from the drop down menu;

Select the Security tab;

Click the Advanced button;

Select the Auditing tab;

Click the Continue button if User Account Control is enabled;

Click the Add button then enter the name of the user or group object whose actions to audit;

Click OK and click the appropriate actions and respective success and failure checkboxes;

Click OK three times to confirm changes and close the window; and

Repeat steps 2 through 9 for each of the keys listed.

2.5. Administrative Templates (Computer)

2.5.1. Control Panel

Control Statement

This section contains recommendations for configuring lock screen settings

Risk/Impact

Insecure personalization settings may lead to unauthorized access.

Risk Rating

High

Implementation Steps

Ensure security options are enabled as recommended in below table. To configure security options settings,

Press Windows key > type Run and type gpedit.msc.

Expand Computer Configuration\Administrative Templates\Control Panel\Personalization and configure the settings with the values as suggested in Appendix 6.

2.5.2. MSS (Legacy)

Control Statement

Ensure the Microsoft security settings should be configured appropriately.

Risk/Impact

Weak controls can result into unauthorized access to server and network.

Risk Rating

High

Implementation Steps

Ensure security options are enabled as recommended in below table. To configure security options settings,

Press Windows key > type Run and type gpedit.msc.

Expand Computer Configuration\Administrative Templates\MSS (Legacy) and configure the settings with the values as suggested in Appendix 6.

Note: This Group Policy path does not exist by default. An additional Group Policy template (MSSlegacy.admx/adml) is required - it is included with Microsoft Security Compliance Manager (SCM)

2.5.3. Network

Control Statement

This section contains recommendations for network settings.

Risk/Impact

Insecure network settings may leads to information leak.

Risk Rating

High

Implementation Steps

Ensure security options are enabled as recommended in below table. To configure security options settings,

Press Windows key > type Run and type gpedit.msc.

Expand Computer Configuration\Administrative Templates\Network\ and configure the settings with the values as suggested in Appendix 6.

Note: This change does not take effect until the computer has been restarted. Note #2: Although Microsoft does not provide an ADMX template to configure this registry value, a custom .ADM template (Set-NetBIOS-nodetype-KB160177.adm) needs to be implemented. Be aware though that simply turning off the group policy setting in the .ADM template will not "undo" the change once applied. Instead, the opposite setting must be applied to change the registry value to the opposite state.

2.5.4. System

Control Statement

This section contains recommendations for System settings.

Risk/Impact

Insecure network settings may leads to information leak or data loss.

Risk Rating

High

Implementation Steps

Ensure security options are enabled as recommended in below table. To configure security options settings,

Press Windows key > type Run and type gpedit.msc.

Expand Computer Configuration\Administrative Templates\Network\ and configure the settings with the values as suggested in Appendix 6.

2.5.5. Windows Component

Control Statement

This section contains recommendations for Windows Component settings.

Risk/Impact

As to mitigate the users of a system could accidentally share sensitive data with other users on the same system.

Risk Rating

High

Implementation Steps

Ensure security options are enabled as recommended in below table. To configure security options settings,

Press Windows key > type Run and type gpedit.msc.

Expand Computer Configuration\Administrative Templates\Windows Components and configure the settings with the values as suggested in Appendix 6.

2.5.6. LAPS

Control Statement

This section contains recommendations for configuring Microsoft Local Administrator Password Solution Risk/Impact

When installed and registered properly, AdmPwd.dll takes no action unless given appropriate GPO commands during Group Policy refresh. Risk Rating

High

Implementation Steps

Ensure security options are enabled as recommended in below table. To configure security options settings,

Press Windows key > type Run and type gpedit.msc.

Expand Computer Configuration\Administrative Templates\LAPS and configure the settings with the values as suggested in Appendix 6.

Note: This Group Policy path does not exist by default. An additional Group Policy template

(AdmPwd.admx/adml) is required - it is included with Microsoft Local Administrator Password Solution (LAPS).

2.5.7. SCM: Pass the Hash Mitigations

Control Statement

This section contains recommendations for mitigating Pass-the-Hash attacks.

Risk/Impact

Local accounts are at high risk for credential theft when the same account and password is configured on multiple systems. Ensuring this policy is Enabled significantly reduces that risk.

Risk Rating

High

Implementation Steps

Ensure security options are enabled as recommended in below table. To configure security options settings,

Press Windows key > type Run and type gpedit.msc.

Expand Computer Configuration\Administrative Templates\SCM: and configure the settings with the values as suggested in Appendix 6.

Note:

This Group Policy path does not exist by default. An additional Group Policy template (PtH.admx/adml) is required - it is included with Microsoft Security Compliance Manager (SCM).

2.6. Encryption

2.6.1. Disable weak encryption protocol

Control Statement

If configured to require client side certificates, TLS can also play a role in client authentication to the server. TLS also provides two additional benefits that are commonly overlooked; integrity guarantees and replay prevention. A TLS stream of communication contains built-in controls to prevent tampering with any portion of the encrypted data. In addition, controls are also built-in to prevent a captured stream of TLS data from being replayed at a later time.

TLS provides the above guarantees to data during transmission. TLS does not offer any of these security benefits to data that is at rest. Therefore appropriate security controls must be added to protect data while at rest within the application or within data stores.

Risk/Impact

An attacker may try to break the integrity of data and also sniff the sensitive information.

Risk Rating

Medium

Implementation Steps

To Ensure the SSL 2.0, SSL 3.0 protocol must be disabled on the server and make sure that the stronger TLS protocols are used, follow these instructions to disable Weak SSL protocols:

Click Start, click Run, type regedit, and then click OK.

In Registry Editor, locate the following registry key/folder:

HKey_Local_Machine\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols 3. Right-click on the SSL 2.0 folder and select New and then click Key. Name the new folder Server.

Inside the Server folder, click the Edit menu, select New, and click DWORD (32-bit) Value.

Enter Enabled as the name and hit Enter.

Ensure that it shows 0x00000000 (0) under the Data column (it should by default). If it doesn't, right-click and select Modify and enter 0 as the Value data.

Now to disable SSL 3.0, right-click on the SSL 3.0 folder and select New and then click Key. Name the new folder Server.

Inside the Server folder, click the Edit menu, select New, and click DWORD (32-bit) Value.

Enter Enabled as the name and hit Enter.

2.6.2. Enable TLS 1.2 and above protocol

Control Statement

If configured to require client side certificates, TLS can also play a role in client authentication to the server. TLS also provides two additional benefits that are commonly overlooked; integrity guarantees and replay prevention. A TLS stream of communication contains built-in controls to prevent tampering with any portion of the encrypted data. In addition, controls are also built-in to prevent a captured stream of TLS data from being replayed at a later time.

TLS provides the above guarantees to data during transmission. TLS does not offer any of these security benefits to data that is at rest. Therefore appropriate security controls must be added to protect data while at rest within the application or within data stores.

Risk/Impact

An attacker may try to break the integrity of data and also sniff the sensitive information.

Risk Rating

Medium

Implementation Steps

The TLS 1.2 & above protocol must be enabled on the server and make sure that the stronger TLS protocols are used, follow these instructions to enable TLS protocols:

Click Start, click Run, type regedit, and then click OK.

In Registry Editor, locate the following registry key/folder:

HKey_Local_Machine\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols 3. Create TLS 1.2 folder and then click Key. Name the new folder Server.

Inside the Server folder, click the Edit menu, select New, and click DWORD (32-bit) Value.

Enter Enabled as the name and hit Enter.

Ensure that it shows 0x00000001 (1) under the Data column. If it doesn't, right-click and select Modify and enter 1 as the Value data.

Now to Enable TLS 1.2 protocol right-click on the TLS 1.2 folder and select New and then click Key. Name the new folder Server.

Inside the Server folder, click the Edit menu, select New, and click DWORD (32-bit) Value.

Enter Enabled as the name and hit Enter.

Ensure that it shows 0x00000001 (1) under the Data column (it should by default). If it doesn't, right-click and select Modify and enter 1 as the data value.

Restart the computer.

2.7. SMB Protocol

2.7.1. Disable Weak SMB Protocol

Control Statement

The Server Message Block (SMB) Protocol is a network file sharing protocol

Risk/Impact

This may lead to transmit passwords in plaintext across the network to other computers that offer weak SMB services.

Risk Rating

High

Implementation Steps

Weak SMB protocol must be disabled on the servers.

Steps to disable weak SMB protocol using the registry: Registry subkey:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters Registry entry: SMB1

REG_DWORD: 0 = Disabled

2.8. Non-Essential Services

2.8.1. Disable Non-Essential Services

Control Statement

Network services that compromise the security of the server should not be installed and only necessary services should be running on the server.

Risk/Impact

Running additional, unnecessary services increases the risk of a malicious user utilizing these services to compromise the security of the systems. Any vulnerability that exists for these services may be used to exploit the system.

Risk Rating

Medium

Implementation Steps

Ensure that all non-essential services are disabled. To configure the services, 1. Click Start > Run and type services.msc.

  1. Stop the non-essential services and also modify the startup type of the service. Refer Appendix – 7

2.9. System Folder Permissions

2.9.1. Directories that contain sensitive Windows system files should be secured.

Control Statement

Restrict access to sensitive Windows directories. The following directories should be secured:

%systemdrive%

%systemroot%

%systemroot%\System32

%systemroot%\System32\drivers

%systemroot%\System32\spool

%systemroot%\System32\config

%systemroot%\sysvol

%systemroot%\security

%systemroot%\ntds

%systemroot%\ntfrs

The recommended guidelines state:

TrustedInstaller - Full control - This folder and subfolders

SYSTEM - Full control - This folder, subfolders and files

Administrators - Full control - This folder, subfolders and files

CREATOR OWNER - Full control - Subfolders and files only

Users - Read & execute - This folder, subfolders and files

Risk/Impact

If unauthorized users gain access to sensitive system files, they could potentially execute a Trojan horse or create a denial of service on the server.

Risk Rating

Low

Implementation Steps

Secure sensitive Windows directories by performing the following steps:

Open Windows Explorer;

Right click on the directory or file and select Properties from the menu;

Select the Security tab;

Highlight each group that should not have access as recommended below and click the Remove button;

click the Add button to add the appropriate groups;

Type in the Group name;

Click OK to accept these changes;

Click the advanced button;

Review the permissions set;

If they are not in compliance with corporate standards or the recommended guidelines, highlight the group and click the Edit... button;

Click the down arrow of the Apply onto: field and select the appropriate access;

Click OK to return to the Access Control Settings window;

Repeat steps 9 through 12 for each group; 14) Click OK to return to the Properties window; and

  1. Click OK to confirm access changes.

2.10. Security setting

2.10.1. PIM solution must integrate all admin accounts

Control Statement

Reconciliation accounts feature from PIMS can be used to ensure that critical accounts are vaulted and password lockout problems do not arise. Risk/Impact

Without PIM solution, limiting and auditing activity of privileged users will not be possible.

Risk Rating

Medium

Implementation Steps

PIM solution must be deployed and all admin accounts should be integrated with it.

2.11. AD Replication

2.11.1. Active Directory Replication

Control Statement

By default, active directory is robust and runs under active-active mode. However, it is important to keep a check to ensure that replication issues are tracked in real time.

Risk/Impact

AD replication ensures that secondary Domain controller is available for switchover in case the primary domain controller fails due to any reason.

Risk Rating

Medium

Implementation Steps

AD replication status should be monitored frequently so that issues do not get unnoticed.

3. Appendix

3.1. Appendix 1

Sr.NoPolicySuggested Setting
1Enforce password history5
2Maximum password age90
3Minimum password age'1 or more day(s)'
4Minimum password length8
5Password must meet complexity requirements'Enabled'
6Store passwords using reversible encryption'Disabled'
7Account lockout duration30 minutes
8Account lockout threshold3
9Reset account lockout counter after0 (Only administrator can reset account)

3.2. Appendix 2

Sr.NoPolicySuggested Setting for Member ServerHow to Verify
1Access credential manager as a trusted callerNo OneComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Access Credential Manager as a trusted caller
2Access this computer from the networkAdministrators, Authenticated Users, ENTERPRISE DOMAIN CONTROLLERS, Everyone, NETWORK SERVICEComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Access this computer from the network
3Act as part of the operating systemRevoke all security groups and accountsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Act as part of the operating system
4Add workstations to domainAdministrators, LOCAL SERVICEComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Add workstations to domain
5Adjust memory quotas for a processAdministrators, NETWORK SERVICE, LOCAL SERVICEComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Adjust memory quotas for a process
6Allow log on locallyAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on locally
7Allow log on through Remote Desktop ServicesAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on through Remote Desktop Services
8Backup files and directoriesAdministrators
9Bypass traverse checkingAdministrators, Authenticated Users, Local Service, Network Service, GITCDOM\0365sqlsvr
10Change the system timeAdministrators, LOCAL SERVICEComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Change the system time
11Change the time zoneAdministrators, Local ServiceComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Change the time zone
12Create a pagefileAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create a pagefile
13Create a token objectNo oneComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create a token object
14Create global objectsAdministrators, service, Local Service, Network Service, SERVICEComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create global objects
15Create permanent shared objectsNo OneComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create permanent shared objects
16Create symbolic linkAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create symbolic links
17Debug programsNo OneComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Debug programs
18Deny access to this computer from the networkGuestsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny access to this computer from the network
19Deny log on as a batch jobGuestsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on as a batch job
20Deny log on as a serviceGuestsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on as a service
21Deny log on locallyGuestsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on locally
22Deny log on through Terminal ServicesGuestsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on through Remote Desktop Services
23Enable computer and user accounts to be trusted for DelegationAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Enable computer and user accounts to be trusted for delegation
24Force shutdown from a remote systemAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Force shutdown from a remote system
25Generate security auditsNETWORK SERVICE, LOCAL SERVICE, gitcdom\o365adfssvrComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Generate security audits
26Impersonate a client after authenticationAdministrators, Service, NETWORK SERVICE, LOCAL SERVICEComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Impersonate a client after authentication
27Increase a process working setAdministrators, Local Service
28Increase scheduling priorityAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Increase scheduling priority
29Load and unload device driversAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Load and unload device drivers
30Lock pages in memoryNo oneComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Lock pages in memory
31Log on as a batch jobAdministratorsComputer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Log on as a batch job
32Manage auditing and security logAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Manage auditing and security log
33Modify an object labelAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Modify an object label
34Modify firmware environment valuesAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Modify firmware environment values
35Perform volume maintenance tasksAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Perform volume maintenance tasks
36Profile single processAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Profile single process
37Profile system performanceAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Profile system performance
38Replace a process level tokenNETWORK SERVICE, LOCAL SERVICEComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Replace a process level token
39Restore files and directoriesAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Restore files and directories
40Shut down the systemAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Shut down the system
41Synchronize directory service dataNo oneComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Synchronize directory service data
42Take ownership of files or other objectsAdministratorsComputer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Take ownership of files or other objects
43Set 'Deny log on through Remote Desktop Services' to include 'Guests, Local account'Guests, Local accountComputer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on through Remote Desktop Services

3.3. Appendix 3

Sr.NoPolicySuggested Setting for Member ServerHow to Verify
1Accounts: Block Microsoft accountsUsers can't add or log on with Microsoft accountsHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System:NoConnectedUser
2Accounts: Guest account status'Disabled'Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Guest account status
3Accounts: Limit local account use of blank passwords to console logon only'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa:LimitBlankPasswordUse
4Account: Rename administrator accountRename the 'Administrator' account nameRename administrator account
5Audit: Force audit policy subcategory settings to override audit policy category settings'Enabled'
6Audit: Shut down system immediately if unable to log security audits'Disabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa:CrashOnAuditFail
7Devices: Allowed to format and eject removable media'Administrators'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon:AllocateDASD
8Devices: Prevent users from installing printer drivers'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Providers\LanMan Print Services\Servers:AddPrinterDrivers
9Domain controller: Allow server operators to schedule tasks'Disabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa:SubmitControl
10Domain controller: LDAP server signing requirements'Require signing'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters:LDAPServerIntegrity
11Domain controller: Refuse machine account password changes'Disabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters:RefusePasswordChange
12Domain member: Digitally encrypt or sign secure channel data (always)'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters:RequireSignOrSeal
13Domain member: Digitally encrypt secure channel data (when possible)'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters:SealSecureChannel
14Domain member: Digitally sign secure channel data (when possible)'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters:SignSecureChannel
15Domain member: Disable machine account password changes'Disabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters:DisablePasswordChange
16Domain member: Maximum machine account password age'Finite days'Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Domain member
17Domain member: Require strong session key'Enabled'
18Interactive logon: Do not display last user name'Enabled'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System:DontDisplayLastUserName
19Interactive logon: Do not require CTRL+ALT+DEL'Disabled'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System:DisableCAD
20Interactive logon: Machine inactivity limit'900 or fewer second(s), but not 0'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System:InactivityTimeoutSecs
21Interactive logon: Number of previous logons to cache'1 or fewer logon(s)'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon:CachedLogonsCount
22Interactive logon: Prompt user to change password before expiration'Between 7 and 14 days'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon:PasswordExpiryWarning
23Interactive logon: Require Domain Controller Authentication to unlock workstation'Enabled'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon:ForceUnlockLogon
24Interactive logon: Smart card removal behavior'Lock Workstation' or higherHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon:ScRemoveOption
25Microsoft network client: Digitally sign communications (always)'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters:RequireSecuritySignature
26Microsoft network client: Digitally sign communications (if server agrees)'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters:EnableSecuritySignature
27Microsoft network client: Send unencrypted password to third-party SMB servers'Disabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters:EnablePlainTextPassword
28Microsoft network server: Amount of idle time required before suspending session'15 or fewer minute(s), but not 0'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters:AutoDisconnect
29Microsoft network server: Digitally sign communications (always)'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters:RequireSecuritySignature
30Microsoft network server: Digitally sign communications (if client agrees)'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters:EnableSecuritySignature
31Microsoft network server: Disconnect clients when logon hours expire'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters:EnableForcedLogoff
32Microsoft network server: Server SPN target name validation level'Accept if provided by client' or higher (MS only)HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters:SMBServerNameHardeningLevel
33Network access: Allow anonymous SID/Name translation'Disabled'Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Allow anonymous SID/Name translation
34Network access: Do not allow anonymous enumeration of SAM accounts'Enabled' (MS only)HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa:RestrictAnonymousSAM
35Network access: Do not allow anonymous enumeration of SAM accounts and shares'Enabled' (MS only)HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa:RestrictAnonymous
36Network access: Do not allow storage of passwords and credentials for network authentication'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa:DisableDomainCreds
37Network access: Let Everyone permissions apply to anonymous users'Disabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa:EveryoneIncludesAnonymous
38Network access: Restrict anonymous access to Named Pipes and Shares'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters:RestrictNullSessAccess
39Network access: Restrict clients allowed to make remote calls to SAM'Administrators: Remote Access: Allow' (MS only)HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa:restrictremotesam
40Network access: Shares that can be accessed anonymously'None'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters:NullSessionShares
41Network access: Sharing and security model for local accounts'Classic - local users authenticate as themselves'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa:ForceGuest
42Network security: Allow Local System to use computer identity for NTLM'Enabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa:UseMachineId
43Network security: Allow LocalSystem NULL session fallback'Disabled'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0:AllowNullSessionFallback
44Network Security: Allow PKU2U authentication requests to this computer to use online identities'Disabled'

3.4. Appendix 4

ProfilePolicySuggested SettingHow to Verify
Domain Profile
Windows Firewall: Domain: Firewall state'On (recommended)'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\EnableFirewall
Windows Firewall: Domain: Inbound connections'Allow (default)'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\DefaultInboundAction
Windows Firewall: Domain: Outbound connections'Allow (default)'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\DefaultOutboundAction
Windows Firewall: Domain: Settings: Display a notification'Yes'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\DisableNotifications
Windows Firewall: Domain: Settings: Apply local firewall rules'Yes (default)'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\AllowLocalPolicyMerge
Windows Firewall: Domain: Settings: Apply local connection security rules'Yes (default)'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\AllowLocalIPsecPolicyMerge
Windows Firewall: Domain: Logging: Name'%SYSTEMROOT%\System32\logfiles\firewall\domainfw.log'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging\LogFilePath
Windows Firewall: Domain: Logging: Size limit (KB)'16,384 KB or greater'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging\LogFileSize
Windows Firewall: Domain: Logging: Log dropped packets'Yes'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging\LogDroppedPackets
Windows Firewall: Domain: Logging: Log successful connections'Yes'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging\LogSuccessfulConnections
Windows Firewall: Domain: Allow unicast response'No'Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Allow unicast response
Private Profile
Windows Firewall: Private: Firewall state'On (recommended)'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\EnableFirewall
Windows Firewall: Private: Inbound connections'Allow'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\DefaultInboundAction
Windows Firewall: Private: Outbound connections'Allow'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\DefaultOutboundAction
Windows Firewall: Private: Settings: Display a notification'No'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\DisableNotifications
Windows Firewall: Private: Settings: Apply local firewall rules'Yes (default)'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\AllowLocalPolicyMerge
Windows Firewall: Private: Settings: Apply local connection security rules'Yes (default)'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\AllowLocalIPsecPolicyMerge
Windows Firewall: Private: Logging: Name'%SYSTEMROOT%\System32\logfiles\firewall\privatefw.log'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging\LogFilePath
Windows Firewall: Private: Logging: Size limit (KB)'16,384 KB or greater'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging\LogFileSize
Windows Firewall: Private: Logging: Log dropped packets'Yes'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging\LogDroppedPackets
Windows Firewall: Private: Logging: Log successful connections'Yes'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging\LogSuccessfulConnections
Public Profile
Windows Firewall: Public: Firewall state'On (recommended)'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\EnableFirewall
Windows Firewall: Public: Inbound connections'Allow'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\DefaultInboundAction
Windows Firewall: Public: Outbound connections'Allow'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\DefaultOutboundAction
Windows Firewall: Public: Settings: Display a notification'Yes'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\DisableNotifications
Windows Firewall: Public: Settings: Apply local firewall rules'No'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\AllowLocalPolicyMerge
Windows Firewall: Public: Settings: Apply local connection security rules'No'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\AllowLocalIPsecPolicyMerge
Windows Firewall: Public: Logging: Name'%SYSTEMROOT%\System32\logfiles\firewall\publicfw.log'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging\LogFilePath
Windows Firewall: Public: Logging: Size limit (KB)'16,384 KB or greater'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging\LogFileSize
Windows Firewall: Public: Logging: Log dropped packets'Yes'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging\LogDroppedPackets
Windows Firewall: Public: Logging: Log successful connections'Yes'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging\LogSuccessfulConnections

3.5. Appendix 5

CategoryPolicySuggested SettingHow to Verify
Account Logon
Audit Credential Validation'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Logon\Audit Credential Validation
Account Management
Audit Application Group Management'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit Application Group Management
Audit Computer Account Management'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit Computer Account Management
Audit Distribution Group Management'Success and Failure' (DC only)Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit Distribution Group Management
Audit Other Account Management Events'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit Other Account Management Events
Audit Security Group Management'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit Security Group Management
Audit User Account Management'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management
Detailed Tracking
Audit PNP Activity'Success'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Detailed Tracking\Audit PNP Activity
Audit Process Creation'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Detailed Tracking\Audit Process Creation
Audit DPAPI Activity'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Detailed Tracking\Audit DPAPI Activity
DS Access
Audit Directory Service Access'Success and Failure' (DC only)Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\DS Access\Audit Directory Service Access
Audit Directory Service Changes'Success and Failure' (DC only)Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\DS Access\Audit Directory Service Changes
Logon/Logoff
Audit Account Lockout'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Account Lockout
Audit Group Membership'Success'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Group Membership
Audit Logoff'Success'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Logoff
Audit Logon'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Logon
Audit Other Logon/Logoff Events'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Other Logon/Logoff Events
Audit Special Logon'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Special Logon
Object Access
Audit Removable Storage'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Object Access\Audit Removable Storage
Policy Change
Audit Audit Policy Change'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Audit Policy Change
Audit Authentication Policy Change'Success'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Authentication Policy Change
Audit Authorization Policy Change'Success'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Authorization Policy Change
Privilege Use
Audit Sensitive Privilege Use'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Privilege Use\Audit Sensitive Privilege Use
System
Audit IPsec Driver'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\System\Audit IPsec Driver
Audit Other System Events'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\System\Audit Other System Events
Audit Security State Change'Success'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\System\Audit Security State Change
Audit Security System Extension'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\System\Audit Security System Extension
Audit System Integrity'Success and Failure'Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\System\Audit System Integrity

3.6. Appendix 6

PathPolicySuggested Setting
Control Panel
Computer Configuration\Administrative Templates\Control Panel\PersonalizationPrevent enabling lock screen camera'Enabled'
Prevent enabling lock screen slide show'Enabled'
Allow Input Personalization'Disabled'
MSS
Computer Configuration\Administrative Templates\MSS (Legacy)MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)'Disabled'
MSS: (DisableIPSourceRouting IPv6) IP source routing protection level'Enabled: Highest protection, source routing is completely disabled'
MSS: (DisableIPSourceRouting) IP source routing protection level'Enabled: Highest protection, source routing is completely disabled'
MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes'Disabled'
MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds'Enabled: 300,000 or 5 minutes (recommended)'
MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers'Enabled'
MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS)'Disabled'
MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)'Enabled'
MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)'Enabled: 5 or fewer seconds'
MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted'Enabled: 3'
MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted'Enabled: 3'
MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning'Enabled: 90% or less'
Network
Computer Configuration\Policies\Administrative Templates\Network\DNS Client\Turn off multicast name resolutionTurn off multicast name resolution'Enabled' (MS Only)
Computer Configuration\Policies\Administrative Templates\Network\Fonts\Enable Font ProvidersEnable Font Providers'Disabled'
Enable insecure guest logons'Disabled'
Turn on Mapper I/O (LLTDIO) driver'Disabled'
Turn on Responder (RSPNDR) driver'Disabled'
Turn off Microsoft Peer-to-Peer Networking Services'Enabled'
Prohibit installation and configuration of Network Bridge on your DNS domain network'Enabled'
Prohibit use of Internet Connection Sharing on your DNS domain network'Enabled'
Require domain users to elevate when setting a network's location'Enabled'
Disable IPv6 (Ensure TCPIP6 Parameter 'DisabledComponents'0xff (255)'
Configuration of wireless settings using Windows Connect Now'Disabled'
Prohibit access of the Windows Connect Now wizards'Enabled'
Minimize the number of simultaneous connections to the Internet or a Windows Domain'Enabled'
Prohibit connection to non-domain networks when connected to domain authenticated network'Enabled'
System
Computer Configuration\Policies\Administrative Templates\System\Audit Process Creation\Include command line in process creation eventsInclude command line in process creation events'Disabled'
Continue experiences on this device'Disabled'
Turn off background refresh of Group Policy'Disabled'
Turn off access to the Store'Enabled'
Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com'Enabled'
Turn off Internet download for Web publishing and online ordering wizards'Enabled'
Turn off printing over HTTP'Disabled'
Turn off Registration if URL connection is referring to Microsoft.com'Enabled'
Turn off Search Companion content file updates'Enabled'
Turn off the "Order Prints" picture task'Enabled'
Turn off the "Publish to Web" task for files and folders'Enabled'
Turn off the Windows Messenger Customer Experience Improvement Program'Enabled'
Turn off Windows Customer Experience Improvement Program'Enabled'
Turn off Windows Error Reporting'Enabled'
Disallow copying of user input methods to the system account for sign-in'Enabled'
Block user from showing account details on sign-in'Enabled'
Logon
Computer Configuration\Policies\Administrative Templates\System\Logon\Do not display network selection UIDo not display network selection UI'Enabled'
Do not enumerate connected users on domain-joined computers'Enabled'
Enumerate local users on domain-joined computers'Disabled'
Turn off app notifications on the lock screen'Enabled'
Turn on convenience PIN sign-in'Disabled'
Remote Procedure Call
Enable RPC Endpoint Mapper Client Authentication'Enabled'
Restrict Unauthenticated RPC clients'Enabled: Authenticated'
Windows Time Service
Computer Configuration\Policies\Administrative Templates\System\Windows Time Service\Time Providers\Enable Windows NTP ClientEnable Windows NTP Client'Enabled'
Computer Configuration\Policies\Administrative Templates\System\Windows Time Service\Time Providers\Enable Windows NTP ServerEnable Windows NTP Server'Enabled'
LAPS
Computer Configuration\Policies\Administrative Templates\LAPS\Enable Local Admin Password ManagementEnable Local Admin Password Management'Enabled'
Computer Configuration\Policies\Administrative Templates\LAPS\Password SettingsPassword Complexity: Large letters + small letters + numbers + special characters'Enabled'
Password Length: 8 or more'8 or more'
Password Age (Days): 90 or fewer'90 days'
SCM
Computer Configuration\Policies\Administrative Templates\SCM: Pass the Hash Mitigations\Apply UAC restrictions to local accounts on network logonsApply UAC restrictions to local accounts on network logons'Enabled'
WDigest Authentication'Disabled'

3.7. Appendix 7

Service NameRecommended Startup TypeComment
AlerterDisabled
Client Services for NetwareDisabled
DHCP ClientDisableEnable, if the System takes dynamic IP from DHCP Server or server configured is in cluster
Error Reporting ServiceDisabled
Fax ServiceDisabledEnable, if Fax service is required on the system.
File Services for MacintoshDisabled
FTP Publishing ServiceDisabled
Help and SupportDisabled
Human Interface Device AccessDisabled
IIS Admin ServiceEnabled
IMAPI CD – Burning COM ServiceDisabled
Internet Connection SharingDisabled
MessengerDisabled
Microsoft POP3 ServiceDisabled
Network DDEDisabled
Network DDE DSDMDisabled
Portable Media Serial NumberDisabled
Print Server for MacintoshDisabled
Shell Hardware DetectionDisabledEnable, if Shell Hardware Detection (ShellHWDetection) service is required to monitor and provide notification for AutoPlay hardware events.
Simple Mail Transfer ProtocolDisabledEnable, if SMTP server is used.
Simple Network Management Protocol (SNMP) ServiceDisabledEnable, if SNMP service is required.
Simple Network Management Protocol (SNMP) TrapDisabled
Smart CardDisabledEnable it if you are using a smart card
Special Administration Console HelperDisabled
TelephonyDisabled
TelnetDisabled
Uninterruptible Power SupplyDisabled
Upload ManagerDisabled
WebClientDisabled
Wireless ConfigurationDisabled
Bluetooth ServiceDisabled