Edit

Share via


Windows security baseline for Windows Server 2025

Note

This page applies specifically to the Azure Security Baseline for Windows Server 2025 and not for any other server editions. This baseline supports the new Customizeable Machine Configuration Security Baseline experience so you may modify the content of the baseline from including/excluding rules to setting different values.

This article details the configuration settings for Windows guests as applicable in the following implementations:

  • Windows machines should meet requirements for the Azure compute security baseline Azure Policy guest configuration definition
  • Vulnerabilities in security configuration on your machines should be remediated in Microsoft Defender for Cloud

For the remediation checks and suggestions we took a best practices approach - however please always ensure that the commands will be tested and not applied blindly in any production environment.

The new release of the policy for both audit and remediation is powered by OSConfig our engine.

For more information, see Azure Policy guest configuration and Overview of the Azure Security Benchmark (V2).

General security controls

Name Description Severity Expected Value
AfdDisableAddressSharing Control Name: System Services Afd DisableAddressSharing
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\Afd\Parameters
Registry Value: DisableAddressSharing
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AllowAnonymousSIDOrNameTranslation
(CCE-10024-8)
Control Name: Network access: Allow anonymous SID/Name translation
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkAccess_AllowAnonymousSIDOrNameTranslation
CSP Value Type: Integer
Warning Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
AllowCustomSSPAPIntoLSASS Control Name: Allow Custom SSPs and APs to be loaded into LSASS
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
Registry Value: AllowCustomSSPsAPs
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AllowedToFormatAndEjectRemovableMedia
(CCE-37701-0)
Control Name: Devices: Allowed to format and eject removable media
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Registry Value: AllocateDASD
Registry Value Type: REG_SZ
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia
CSP Value Type: String
Warning Domain Controller = "OneOf(Equals('0'), Equals(''))"
Member Server = "OneOf(Equals('0'), Equals(''))"
Workgroup Member = "OneOf(Equals('0'), Equals(''))"
AllowICMPRedirectsToOverrideOSPFGeneratedRoutes
(AZ-WIN-73503)
Control Name: MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Registry Value: EnableICMPRedirect
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
AllowLocalSystemNULLSessionFallback
(CCE-37035-3)
Control Name: Network security: Allow LocalSystem NULL session fallback
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0
Registry Value: allownullsessionfallback
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkSecurity_AllowLocalSystemNULLSessionFallback
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
AllowLocalSystemToUseComputerIdentityForNTLM
(CCE-38341-4)
Control Name: Network security: Allow Local System to use computer identity for NTLM
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: UseMachineId
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkSecurity_AllowLocalSystemToUseComputerIdentityForNTLM
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AllowPKU2UAuthenticationAllowOnlineID
(CCE-38047-7)
Control Name: Network Security: Allow PKU2U authentication requests to this computer to use online identities
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\pku2u
Registry Value: AllowOnlineID
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AllowSystemToBeShutDownWithoutHavingToLogOn
(CCE-36788-8)
Control Name: Shutdown: Allow system to be shut down without having to log on
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: ShutdownWithoutLogon
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn
CSP Value Type: Integer
Warning Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
AllowTheComputerToIgnoreNetBIOSNameReleaseRequestsExceptFromWINSServers
(AZ-WIN-202214)
Control Name: MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\NetBT\Parameters
Registry Value: NoNameReleaseOnDemand
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AllowUIAccessApplicationsToPromptForElevation
(CCE-36863-9)
Control Name: User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: EnableUIADesktopToggle
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation
CSP Value Type: Integer
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
AmountOfIdleTimeRequiredBeforeSuspendingSession
(CCE-38046-9)
Control Name: Microsoft network server: Amount of idle time required before suspending session
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters
Registry Value: AutoDisconnect
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession
CSP Value Type: Integer
Critical Domain Controller = "Range(1, 15)"
Member Server = "Range(1, 15)"
Workgroup Member = "Range(1, 15)"
ApplicationIdentityStartupType Control Name: Application Identity
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\AppIDSvc
Registry Value: Start
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(2)"
Member Server = "Equals(2)"
Workgroup Member = "Equals(2)"
ApplicationManagementMSIAllowUserControlOverInstall
(CCE-36400-0)
Control Name: Allow user control over installs
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Installer
Registry Value: EnableUserControl
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/ApplicationManagement/MSIAllowUserControlOverInstall
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
ApplicationManagementMSIAlwaysInstallWithElevatedPrivileges
(CCE-37490-0)
Control Name: Always install with elevated privileges
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Installer
Registry Value: AlwaysInstallElevated
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges
CSP Value Type: Integer
Warning Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
ApplyUACRestrictionsToLocalAccountsOnNetworkLogon
(AZ-WIN-73495)
Control Name: Apply UAC restrictions to local accounts on network logons
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: LocalAccountTokenFilterPolicy
Registry Value Type: REG_DWORD
Critical Member Server = "Equals(0)"
AppRuntimeAllowMicrosoftAccountsToBeOptional
(CCE-38354-7)
Control Name: Allow Microsoft accounts to be optional
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: MSAOptional
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AuditAccountLockout
(CCE-37133-6)
Control Name: Audit Account Lockout
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountLogonLogoff_AuditAccountLockout
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(2), Equals(3))"
Member Server = "OneOf(Equals(2), Equals(3))"
Workgroup Member = "OneOf(Equals(2), Equals(3))"
AuditAuthenticationPolicyChange
(CCE-38327-3)
Control Name: Audit Authentication Policy Change
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/PolicyChange_AuditAuthenticationPolicyChange
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
Member Server = "OneOf(Equals(1), Equals(3))"
Workgroup Member = "OneOf(Equals(1), Equals(3))"
AuditAuthorizationPolicyChange
(CCE-36320-0)
Control Name: Audit Authorization Policy Change
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/PolicyChange_AuditAuthorizationPolicyChange
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
Member Server = "OneOf(Equals(1), Equals(3))"
Workgroup Member = "OneOf(Equals(1), Equals(3))"
AuditBackupAndRestorePrivilege Control Name: Audit the use of Backup and Restore privilege
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: FullPrivilegeAuditing
Registry Value Type: REG_BINARY
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Audit_AuditTheUseOfBackupAndRestoreprivilege
CSP Value Type: Binary
Critical Domain Controller = "Equals('MDA=')"
Member Server = "Equals('MDA=')"
Workgroup Member = "Equals('MDA=')"
AuditClientDoesNotSupportEncryption Control Name: Audit client does not support encryption
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanWorkstation
Registry Value: AuditClientDoesNotSupportEncryption
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AuditClientDoesNotSupportSigning Control Name: Audit client does not support signing
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanWorkstation
Registry Value: AuditClientDoesNotSupportSigning
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AuditComputerAccountManagement
(CCE-38004-8)
Control Name: Audit Computer Account Management
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountManagement_AuditComputerAccountManagement
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
AuditCredentialValidation
(CCE-37741-6)
Control Name: Audit Credential Validation
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountLogon_AuditCredentialValidation
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditDetailedFileShare
(AZ-WIN-00100)
Control Name: Audit Detailed File Share
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/ObjectAccess_AuditDetailedFileShare
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(2), Equals(3))"
Member Server = "OneOf(Equals(2), Equals(3))"
Workgroup Member = "OneOf(Equals(2), Equals(3))"
AuditDirectoryServiceAccess
(CCE-37433-0)
Control Name: Audit Directory Service Access
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/DSAccess_AuditDirectoryServiceAccess
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(2), Equals(3))"
AuditDirectoryServiceChanges
(CCE-37616-0)
Control Name: Audit Directory Service Changes
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/DSAccess_AuditDirectoryServiceChanges
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
AuditDirectoryServiceReplication
(AZ-WIN-00093)
Control Name: Audit Directory Service Replication
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/DSAccess_AuditDirectoryServiceReplication
CSP Value Type: Integer
Critical Domain Controller = "Range(0, )"
AuditDistributionGroupManagement
(CCE-36265-7)
Control Name: Audit Distribution Group Management
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountManagement_AuditDistributionGroupManagement
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
AuditFileShare
(AZ-WIN-00102)
Control Name: Audit File Share
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/ObjectAccess_AuditFileShare
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditGroupMembership
(AZ-WIN-00026)
Control Name: Audit Group Membership
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountLogonLogoff_AuditGroupMembership
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
Member Server = "OneOf(Equals(1), Equals(3))"
Workgroup Member = "OneOf(Equals(1), Equals(3))"
AuditInsecureGuestLogon Control Name: Audit insecure guest logon
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanServer
Registry Value: AuditInsecureGuestLogon
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AuditIPsecDriver
(CCE-37853-9)
Control Name: Audit IPsec Driver
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/System_AuditIPsecDriver
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditKerberosAuthenticationService
(AZ-WIN-00004)
Control Name: Audit Kerberos Authentication Service
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountLogon_AuditKerberosAuthenticationService
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
AuditKerberosServiceTicketOperations
(AZ-WIN-00005)
Control Name: Audit Kerberos Service Ticket Operations
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountLogon_AuditKerberosServiceTicketOperations
CSP Value Type: Integer
Critical Domain Controller = "Equals(2)"
AuditLogoff
(CCE-38237-4)
Control Name: Audit Logoff
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountLogonLogoff_AuditLogoff
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
Member Server = "OneOf(Equals(1), Equals(3))"
Workgroup Member = "OneOf(Equals(1), Equals(3))"
AuditLogon
(CCE-38036-0)
Control Name: Audit Logon
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountLogonLogoff_AuditLogon
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditMPSSVCRuleLevelPolicyChange
(AZ-WIN-00111)
Control Name: Audit MPSSVC Rule-Level Policy Change
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/PolicyChange_AuditMPSSVCRuleLevelPolicyChange
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditOtherAccountManagementEvents
(CCE-37855-4)
Control Name: Audit Other Account Management Events
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountManagement_AuditOtherAccountManagementEvents
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
AuditOtherLogonLogoffEvents
(CCE-36322-6)
Control Name: Audit Other Logon/Logoff Events
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountLogonLogoff_AuditOtherLogonLogoffEvents
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditOtherObjectAccessEvents
(AZ-WIN-00113)
Control Name: Audit Other Object Access Events
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/ObjectAccess_AuditOtherObjectAccessEvents
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditOtherPolicyChangeEvents
(AZ-WIN-00114)
Control Name: Audit events generated by other security policy changes that are not audited in the policy change category
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/PolicyChange_AuditOtherPolicyChangeEvents
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(2), Equals(3))"
Member Server = "OneOf(Equals(2), Equals(3))"
Workgroup Member = "OneOf(Equals(2), Equals(3))"
AuditOtherSystemEvents
(CCE-38030-3)
Control Name: Audit Other System Events
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/System_AuditOtherSystemEvents
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditPnPExternalDevice
(AZ-WIN-00182)
Control Name: Audit when plug and play detects an external device
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/DetailedTracking_AuditPNPActivity
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AuditPolicyChange
(CCE-38028-7)
Control Name: Audit Policy Change
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/PolicyChange_AuditPolicyChange
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AuditProcessCreatedOrStarted
(CCE-36059-4)
Control Name: Audit Events generated when a process is created or starts
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/DetailedTracking_AuditProcessCreation
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AuditRemovableStorage
(CCE-37617-8)
Control Name: Audit Removable Storage
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/ObjectAccess_AuditRemovableStorage
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditSecurityGroupManagement
(CCE-38034-5)
Control Name: Audit Security Group Management
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountManagement_AuditSecurityGroupManagement
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
Member Server = "OneOf(Equals(1), Equals(3))"
Workgroup Member = "OneOf(Equals(1), Equals(3))"
AuditSecurityStateChange
(CCE-38114-5)
Control Name: Audit Security State Change
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/System_AuditSecurityStateChange
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
Member Server = "OneOf(Equals(1), Equals(3))"
Workgroup Member = "OneOf(Equals(1), Equals(3))"
AuditSecuritySystemExtension
(CCE-36144-4)
Control Name: Audit Security System Extension
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/System_AuditSecuritySystemExtension
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
Member Server = "OneOf(Equals(1), Equals(3))"
Workgroup Member = "OneOf(Equals(1), Equals(3))"
AuditSensitivePrivilegeUse
(CCE-36267-3)
Control Name: Audit Sensitive Privilege Use
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/PrivilegeUse_AuditSensitivePrivilegeUse
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditServerDoesNotSupportEncryption Control Name: Audit server does not support encryption
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanServer
Registry Value: AuditServerDoesNotSupportEncryption
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AuditServerDoesNotSupportSigning Control Name: Audit server does not support signing
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanServer
Registry Value: AuditServerDoesNotSupportSigning
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AuditSettingsIncludeCmdLine
(CCE-36925-6)
Control Name: Include command line in process creation events
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit
Registry Value: ProcessCreationIncludeCmdLine_Enabled
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AuditSpecialLogon
(CCE-36266-5)
Control Name: Audit Special Logon
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountLogonLogoff_AuditSpecialLogon
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
Member Server = "OneOf(Equals(1), Equals(3))"
Workgroup Member = "OneOf(Equals(1), Equals(3))"
AuditSystemIntegrity
(CCE-37132-8)
Control Name: Audit System Integrity
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/System_AuditSystemIntegrity
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AuditUserAccountManagement
(CCE-37856-2)
Control Name: Audit User Account Management
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Audit/AccountManagement_AuditUserAccountManagement
CSP Value Type: Integer
Critical Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
AutoplayDisallowAutoplayForNonVolumeDevices
(CCE-37636-8)
Control Name: Disallow Autoplay for non-volume devices
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Explorer
Registry Value: NoAutoplayfornonVolume
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AutoplaySetDefaultAutoRunBehavior
(CCE-38217-6)
Control Name: Set the default behavior for AutoRun
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Registry Value: NoAutorun
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AutoplayTurnOffAutoPlay
(CCE-36875-3)
Control Name: Turn off Autoplay
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Registry Value: NoDriveTypeAutoRun
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(255)"
Member Server = "Equals(255)"
Workgroup Member = "Equals(255)"
BehaviorOfTheElevationPromptForAdministrators
(CCE-37029-6)
Control Name: User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: ConsentPromptBehaviorAdmin
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators
CSP Value Type: Integer
Critical Domain Controller = "Range(1, 2)"
Member Server = "Range(1, 2)"
Workgroup Member = "Range(1, 2)"
BehaviorOfTheElevationPromptForStandardUsers
(CCE-36864-7)
Control Name: User Account Control: Behavior of the elevation prompt for standard users
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: ConsentPromptBehaviorUser
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers
CSP Value Type: Integer
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
BlockConsumerMicrosoftAccounts
(AZ-WIN-20198)
Control Name: Block all consumer Microsoft account user authentication
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\MicrosoftAccount
Registry Value: DisableUserAuth
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
BlockNetbiosDiscovery Control Name: Block NetBIOS-based discovery for domain controller location
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Netlogon\Parameters
Registry Value: BlockNetbiosDiscovery
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
BlockNTLM Control Name: Block NTLM (LM NTLM NTLMv2)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanWorkstation
Registry Value: BlockNTLM
Registry Value Type: REG_DWORD
Important Domain Controller = "Range(0, 1)"
Member Server = "Range(0, 1)"
Workgroup Member = "Range(0, 1)"
BlockNTLMServerExceptionList Control Name: Block NTLM Server Exception List
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanWorkstation
Registry Value: BlockNTLMServerExceptionList
Registry Value Type: REG_MULTI_SZ
Informational Domain Controller = "OneOf(Equals(''), Equals(null))"
Member Server = "OneOf(Equals(''), Equals(null))"
Workgroup Member = "OneOf(Equals(''), Equals(null))"
ClearVirtualMemoryPageFile
(AZ-WIN-00181)
Control Name: Shutdown: Clear virtual memory pagefile
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management
Registry Value: ClearPageFileAtShutdown
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile
CSP Value Type: Integer
Critical Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
ConfigureDNSClientNETBIOS Control Name: Configure NetBIOS settings
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient
Registry Value: EnableNetbios
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
ConfigureKernelShadowStacksLaunch Control Name: Turn On Virtualization Based Security
KernelShadowStackLaunch
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
Registry Value: ConfigureKernelShadowStacksLaunch
Registry Value Type: REG_DWORD
Warning Domain Controller = "Range(1, 2)"
Member Server = "Range(1, 2)"
Workgroup Member = "Range(1, 2)"
ConfigureSMBV1ClientDriver
(AZ-WIN-00150)
Control Name: Configure SMB v1 client driver
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\MrxSmb10
Registry Value: Start
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(4)"
Member Server = "Equals(4)"
Workgroup Member = "Equals(4)"
ConfigureSMBV1Server
(AZ-WIN-00175)
Control Name: Disable SMB v1 server
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters
Registry Value: SMB1
Registry Value Type: REG_DWORD
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
ConnectivityDisableDownloadingOfPrintDriversOverHTTP
(CCE-36625-2)
Control Name: Turn off downloading of print drivers over HTTP
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers
Registry Value: DisableWebPnPDownload
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
ConnectivityProhibitInstallationAndConfigurationOfNetworkBridge
(CCE-38002-2)
Control Name: Prohibit installation and configuration of Network Bridge on your DNS domain network
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Network Connections
Registry Value: NC_AllowNetBridge_NLA
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
CredentialProvidersAllowPINLogon
(CCE-37528-7)
Control Name: Turn on convenience PIN sign-in
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
Registry Value: AllowDomainPINLogon
Registry Value Type: REG_DWORD
Warning Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
CredentialsDelegationRemoteHostAllowsDelegationOfNonExportableCredentials
(AZ-WIN-20199)
Control Name: Remote host allows delegation of non-exportable credentials
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation
Registry Value: AllowProtectedCreds
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
CredentialsUIDisablePasswordReveal
(CCE-37534-5)
Control Name: Do not display the password reveal button
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\CredUI
Registry Value: DisablePasswordReveal
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
CredentialsUIEnumerateAdministrators
(CCE-36512-2)
Control Name: Enumerate administrator accounts on elevation
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CredUI
Registry Value: EnumerateAdministrators
Registry Value Type: REG_DWORD
Warning Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
CredSspAllowEncryptionOracle
(AZ-WIN-201910)
Control Name: Encryption Oracle Remediation for CredSSP protocol
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\Parameters
Registry Value: AllowEncryptionOracle
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
CryptographyAllowedKerberosEncryptionTypes
(CCE-37755-6)
Control Name: Network Security: Configure encryption types allowed for Kerberos
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters
Registry Value: SupportedEncryptionTypes
Registry Value Type: REG_DWORD
Critical Domain Controller = "OneOf(Equals(2147483624), Equals(2147483632), Equals(2147483640))"
Member Server = "OneOf(Equals(2147483624), Equals(2147483632), Equals(2147483640))"
Workgroup Member = "OneOf(Equals(2147483624), Equals(2147483632), Equals(2147483640))"
CryptographyEccCurve Control Name: SSL Cryptography EccCurves
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Cryptography\Configuration\SSL\00010002
Registry Value: EccCurves
Registry Value Type: REG_MULTI_SZ
Critical Domain Controller = "ContainsAtMost('NistP256','NistP384')"
Member Server = "ContainsAtMost('NistP256','NistP384')"
Workgroup Member = "ContainsAtMost('NistP256','NistP384')"
CryptographyForceStrongKeyProtection
(AZ-WIN-73699)
Control Name: System Cryptography: Force strong key protection for user keys stored on the computer
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Cryptography
Registry Value: ForceKeyProtection
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Cryptography/ConfigureSystemCryptographyForceStrongKeyProtection
CSP Value Type: Integer
Important Domain Controller = "Equals(2)"
Member Server = "Equals(2)"
Workgroup Member = "Equals(2)"
CryptographySSLCipherSuites
(AZ-WIN-00153)
Control Name: SSL Cryptography Cipher suites
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Cryptography\Configuration\SSL\00010002
Registry Value: Functions
Registry Value Type: REG_SZ
Critical (Domain Controller = "ContainsAtMost('TLS_AES_128_GCM_SHA256','TLS_AES_256_GCM_SHA384',
'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384',
'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384',
'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256','TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384',
'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256','TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384')",
Member Server = "ContainsAtMost('TLS_AES_128_GCM_SHA256','TLS_AES_256_GCM_SHA384',
'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384',
'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384',
'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256','TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384',
'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256','TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384')",
Workgroup Member = "ContainsAtMost('TLS_AES_128_GCM_SHA256','TLS_AES_256_GCM_SHA384',
'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384',
'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384',
'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256','TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384',
'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256','TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384')")
DetectApplicationInstallationsAndPromptForElevation
(CCE-36533-8)
Control Name: User Account Control: Detect application installations and prompt for elevation
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: EnableInstallerDetection
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DeviceGuardLsaCfgFlags
(AZ-WIN-73515)
Control Name: Turn on CredentialGuard
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: LsaCfgFlags
Registry Value Type: REG_DWORD
Critical Member Server = "Range(1, 2)"
Workgroup Member = "Range(1, 2)"
DeviceGuardRequireMicrosoftSignedBootChain Control Name: Secured-Core Require MicrosoftSignedBootChain
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard
Registry Value: RequireMicrosoftSignedBootChain
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DeviceGuardRequirePlatformSecurityFeatures
(AZ-WIN-73513)
Control Name: Secured-Core Require Platform Security (Secure Boot, DMA)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
Registry Value: RequirePlatformSecurityFeatures
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/DeviceGuard/RequirePlatformSecurityFeatures
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(3))"
Member Server = "OneOf(Equals(1), Equals(3))"
Workgroup Member = "OneOf(Equals(1), Equals(3))"
DeviceGuardRequireUEFIMemoryAttributesTable Control Name: Secured-Core Require UEFI Memory Attribute Table
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
Registry Value: HVCIMATRequired
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DeviceInstallationPreventDeviceMetadataFromNetwork
(AZ-WIN-202251)
Control Name: Prevent device metadata retrieval from the Internet
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Device Metadata
Registry Value: PreventDeviceMetadataFromNetwork
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DeviceLockAccountLockoutPolicy Control Name: Account lockout policy
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/DeviceLock/AccountLockoutPolicy
CSP Value Type: String
Critical Domain Controller = "AllOf(Pattern('ResetAccountLockoutCounterAfter:[1][5-9]│[2-9]\d│[1-9]\d{2,}'),
Pattern('AccountLockoutDuration:[1][5-9]│[2-9]\d│[1-9]\d{2,}'), Pattern('AccountLockoutThreshold:[1-3]'))"
Member Server = "AllOf(Pattern('ResetAccountLockoutCounterAfter:[1][5-9]│[2-9]\d│[1-9]\d{2,}'),
Pattern('AccountLockoutDuration:[1][5-9]│[2-9]\d│[1-9]\d{2,}'),
Pattern('AccountLockoutThreshold:[1-3]'))"
Workgroup Member = "AllOf(Pattern('ResetAccountLockoutCounterAfter:[1][5-9]│[2-9]\d│[1-9]\d{2,}'), Pattern('AccountLockoutDuration:[1][5-9]│[2-9]\d│[1-9]\d{2,}'), Pattern('AccountLockoutThreshold:[1-3]'))"
DeviceLockClearTextPassword
(CCE-36286-3)
Control Name: Store passwords using reversible encryption
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/DeviceLock/ClearTextPassword
CSP Value Type: Integer
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
DeviceLockMaximumPasswordAge
(CCE-37167-4)
Control Name: Maximum password age
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/DeviceLock/MaximumPasswordAge
CSP Value Type: Integer
Critical Domain Controller = "Range(1, 60)"
Member Server = "Range(1, 60)"
Workgroup Member = "Range(1, 70)"
DeviceLockMinimumPasswordAge
(CCE-37073-4)
Control Name: Minimum password age
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/DeviceLock/MinimumPasswordAge
CSP Value Type: Integer
Critical Domain Controller = "Range(1, )"
Member Server = "Range(1, )"
Workgroup Member = "Range(1, )"
DeviceLockMinimumPasswordLength
(CCE-36534-6)
Control Name: Minimum password length
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/DeviceLock/MinimumPasswordLength
CSP Value Type: Integer
Critical Member Server = "Range(14, )"
Workgroup Member = "Range(14, )"
DeviceLockPasswordComplexity
(CCE-37063-5)
Control Name: Password must meet complexity requirements
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/DeviceLock/PasswordComplexity
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DeviceLockPasswordHistorySize
(CCE-37166-6)
Control Name: Enforce password history
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/DeviceLock/PasswordHistorySize
CSP Value Type: Integer
Critical Domain Controller = "Equals(24)"
Member Server = "Equals(24)"
Workgroup Member = "Equals(24)"
DeviceLockPreventEnablingLockScreenCamera
(CCE-38347-1)
Control Name: Prevent enabling lock screen camera
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Personalization
Registry Value: NoLockScreenCamera
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DeviceLockPreventLockScreenSlideShow
(CCE-38348-9)
Control Name: Prevent enabling lock screen slide show
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Personalization
Registry Value: NoLockScreenSlideshow
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DigitallyEncryptOrSignSecureChannelDataAlways
(CCE-36142-8)
Control Name: Domain member: Digitally encrypt or sign secure channel data (always)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters
Registry Value: RequireSignOrSeal
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
DigitallyEncryptSecureChannelDataWhenPossible
(CCE-37130-2)
Control Name: Domain member: Digitally encrypt secure channel data (when possible)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters
Registry Value: SealSecureChannel
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
DigitallySignCommunicationsAlwaysClient
(CCE-36325-9)
Control Name: Microsoft network client: Digitally sign communications (always)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters
Registry Value: RequireSecuritySignature
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsAlways
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DigitallySignCommunicationsAlwaysServer
(CCE-37864-6)
Control Name: Microsoft network server: Digitally sign communications (always)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters
Registry Value: RequireSecuritySignature
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsAlways
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DigitallySignCommunicationsIfClientAgrees
(CCE-35988-5)
Control Name: Microsoft network server: Digitally sign communications (if client agrees)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters
Registry Value: EnableSecuritySignature
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsIfClientAgrees
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DigitallySignCommunicationsIfServerAgrees
(CCE-36269-9)
Control Name: Microsoft network client: Digitally sign communications (if server agrees)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters
Registry Value: EnableSecuritySignature
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DigitallySignSecureChannelDataWhenPossible
(CCE-37222-7)
Control Name: Domain member: Digitally sign secure channel data (when possible)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters
Registry Value: SignSecureChannel
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/DomainMember_DigitallySignSecureChannelDataWhenPossible
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
DisableLocalAccountPasswordChanges
(CCE-37508-9)
Control Name: Domain member: Disable machine account password changes
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters
Registry Value: DisablePasswordChange
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges
CSP Value Type: Integer
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
DisableSMBv1Client
(AZ-WIN-00122)
Control Name: Disable SMB v1 client (remove dependency on LanmanWorkstation)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation
Registry Value: DependOnService
Registry Value Type: REG_MULTI_SZ
Critical Domain Controller = "ContainsAtMost('Bowser', 'MRxSmb20', 'NSI')"
Member Server = "ContainsAtMost('Bowser', 'MRxSmb20', 'NSI')"
Workgroup Member = "ContainsAtMost('Bowser', 'MRxSmb20', 'NSI')"
DisconnectClientsWhenLogonHoursExpire
(CCE-37972-7)
Control Name: Microsoft network server: Disconnect clients when logon hours expire
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters
Registry Value: EnableForcedLogOff
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DisconnectClientsWhenLogonHoursExpire
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DmaGuardDeviceEnumerationPolicy Control Name: Enumeration policy for external devices incompatible with Kernel DMA Protection
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Kernel DMA Protection
Registry Value: DeviceEnumerationPolicy
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/DmaGuard/DeviceEnumerationPolicy
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(0), Equals(1))"
Member Server = "OneOf(Equals(0), Equals(1))"
Workgroup Member = "OneOf(Equals(0), Equals(1))"
DnsClientTurn_Off_Multicast
(AZ-WIN-00145)
Control Name: Turn off multicast name resolution
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient
Registry Value: EnableMulticast
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
DODownloadMode
(AZ-WIN-93259)
Control Name: Delivery Optimization: Download Mode Methods
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization
Registry Value: DODownloadMode
Registry Value Type: REG_DWORD
Informational Domain Controller = "OneOf(Equals(0), Equals(1), Equals(2), Equals(99), Equals(100))"
Member Server = "OneOf(Equals(0), Equals(1), Equals(2), Equals(99), Equals(100))"
Workgroup Member = "OneOf(Equals(0), Equals(1), Equals(2), Equals(99), Equals(100))"
DoNotAllowAnonymousEnumerationOfSAMAccounts
(CCE-36316-8)
Control Name: Network access: Do not allow anonymous enumeration of SAM accounts
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: RestrictAnonymousSAM
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccounts
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(null))"
Member Server = "OneOf(Equals(1), Equals(null))"
Workgroup Member = "OneOf(Equals(1), Equals(null))"
DoNotAllowAnonymousEnumerationOfSamAccountsAndShares
(CCE-36077-6)
Control Name: Network access: Do not allow anonymous enumeration of SAM accounts and shares
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: RestrictAnonymous
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSamAccountsAndShares
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DoNotDisplayLastSignedIn
(CCE-36056-0)
Control Name: Interactive logon: Do not display last user name
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: DontDisplayLastUserName
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
DoNotRequireCTRLALTDEL
(CCE-37637-6)
Control Name: Interactive logon: Do not require CTRL+ALT+DEL
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: DisableCAD
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/InteractiveLogon_DoNotRequireCTRLALTDEL
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
EnableAuthEpResolution
(CCE-37346-4)
Control Name: Enable RPC Endpoint Mapper Client Authentication
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Rpc
Registry Value: EnableAuthEpResolution
Registry Value Type: REG_DWORD
Critical Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
EnableAuthRateLimiter Control Name: Enable authentication rate limiter
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanServer
Registry Value: EnableAuthRateLimiter
Registry Value Type: REG_DWORD
Warning Domain Controller = "OneOf(Equals(1), Equals(null))"
Member Server = "OneOf(Equals(1), Equals(null))"
Workgroup Member = "OneOf(Equals(1), Equals(null))"
EnableAuthRateLimiterTimeout Control Name: Enable authentication rate limiter (Delay Timeout)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters
Registry Value: InvalidAuthenticationDelayTimeInMs
Registry Value Type: REG_DWORD
Informational Domain Controller = "Range(2000, 5000)"
Member Server = "Range(2000, 5000)"
Workgroup Member = "Range(2000, 5000)"
EnabledNTPClient
(CCE-37843-0)
Control Name: Enable Windows NTP Client
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpClient
Registry Value: Enabled
Registry Value Type: REG_DWORD
Critical Workgroup Member = "Equals(1)"
EnableGuestAccountStatus
(CCE-37432-2)
Control Name: Accounts: Guest account status
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus
CSP Value Type: Integer
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
EnableMailslotsLanmanServer Control Name: Enable remote mailslots (Lanman Server)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Browser
Registry Value: EnableMailslots
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
EnableMailslotsLanmanWorkstation Control Name: Enable remote mailslots (Lanman Workstation)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider
Registry Value: EnableMailslots
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
EnableStructuredExceptionHandlingOverwriteProtection
(AZ-WIN-202210)
Control Name: Enable Structured Exception Handling Overwrite Protection (SEHOP)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\kernel
Registry Value: DisableExceptionChainValidation
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
EncryptNTFSPagingFile Control Name: System Policies NtfsEncryptPagingFile
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Policies
Registry Value: NtfsEncryptPagingFile
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
EventLogChannelSecurityLogRetention
(CCE-37145-0)
Control Name: Security: Control Event Log behavior when the log file reaches its maximum size
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\Security
Registry Value: Retention
Registry Value Type: REG_SZ
Critical Domain Controller = "OneOf(Equals('0'), Equals(null))"
Member Server = "OneOf(Equals('0'), Equals(null))"
Workgroup Member = "OneOf(Equals('0'), Equals(null))"
EventLogChannelSetupLogMaxSize
(CCE-37526-1)
Control Name: Setup: Specify the maximum log file size (KB)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\Setup
Registry Value: MaxSize
Registry Value Type: REG_DWORD
Critical Domain Controller = "Range(32768, )"
Member Server = "Range(32768, )"
Workgroup Member = "Range(32768, )"
EventLogChannelSetupLogRetention
(CCE-38276-2)
Control Name: Setup: Control Event Log behavior when the log file reaches its maximum size
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\Setup
Registry Value: Retention
Registry Value Type: REG_SZ
Critical Domain Controller = "OneOf(Equals('0'), Equals(null))"
Member Server = "OneOf(Equals('0'), Equals(null))"
Workgroup Member = "OneOf(Equals('0'), Equals(null))"
EventLogChannelSystemLogRetention
(CCE-36160-0)
Control Name: System: Control Event Log behavior when the log file reaches its maximum size
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\System
Registry Value: Retention
Registry Value Type: REG_SZ
Critical Domain Controller = "OneOf(Equals('0'), Equals(null))"
Member Server = "OneOf(Equals('0'), Equals(null))"
Workgroup Member = "OneOf(Equals('0'), Equals(null))"
EventLogPercentageThresholdSecurityEventLogMaximumSizeReached
(AZ-WIN-202212)
Control Name: MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\Eventlog\Security
Registry Value: WarningLevel
Registry Value Type: REG_DWORD
Informational Domain Controller = "Range(50, 90)"
Member Server = "Range(50, 90)"
Workgroup Member = "Range(50, 90)"
EventLogServiceControlEventLogBehavior
(CCE-37775-4)
Control Name: Application: Control Event Log behavior when the log file reaches its maximum size
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\Application
Registry Value: Retention
Registry Value Type: REG_SZ
Critical Domain Controller = "OneOf(Equals('0'), Equals(null))"
Member Server = "OneOf(Equals('0'), Equals(null))"
Workgroup Member = "OneOf(Equals('0'), Equals(null))"
EventLogServiceSpecifyMaximumFileSizeApplicationLog
(CCE-37948-7)
Control Name: Application: Specify the maximum log file size (KB)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\Application
Registry Value: MaxSize
Registry Value Type: REG_DWORD
Critical Domain Controller = "Range(32768, )"
Member Server = "Range(32768, )"
Workgroup Member = "Range(32768, )"
EventLogServiceSpecifyMaximumFileSizeSecurityLog
(CCE-37695-4)
Control Name: Security: Specify the maximum log file size (KB)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\Security
Registry Value: MaxSize
Registry Value Type: REG_DWORD
Critical Domain Controller = "Range(196608, )"
Member Server = "Range(196608, )"
Workgroup Member = "Range(196608, )"
EventLogServiceSpecifyMaximumFileSizeSystemLog
(CCE-36092-5)
Control Name: System: Specify the maximum log file size (KB)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\System
Registry Value: MaxSize
Registry Value Type: REG_DWORD
Critical Domain Controller = "Range(32768, )"
Member Server = "Range(32768, )"
Workgroup Member = "Range(32768, )"
ExperienceAllowWindowsConsumerFeatures
(AZ-WIN-00144)
Control Name: Turn off Microsoft consumer experiences
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\CloudContent
Registry Value: DisableWindowsConsumerFeatures
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Experience/AllowWindowsConsumerFeatures
CSP Value Type: Integer
Warning Domain Controller = "OneOf(Equals(1), Equals(null))"
Member Server = "OneOf(Equals(1), Equals(null))"
Workgroup Member = "OneOf(Equals(1), Equals(null))"
ExperienceDisableConsumerAccountStateContent
(AZ-WIN-202217)
Control Name: Turn off cloud consumer account state content
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\CloudContent
Registry Value: DisableConsumerAccountStateContent
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Experience/DisableConsumerAccountStateContent
CSP Value Type: Integer
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
ExperienceDoNotShowFeedbackNotifications
(AZ-WIN-00140)
Control Name: Do not show feedback notifications
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection
Registry Value: DoNotShowFeedbackNotifications
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FileExplorerTurnOffHeapTerminationOnCorruption
(CCE-36660-9)
Control Name: Turn off heap termination on corruption
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Explorer
Registry Value: NoHeapTerminationOnCorruption
Registry Value Type: REG_DWORD
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
FirewallDomainProfileApplyLocalConnectionSecurityRules
(CCE-38040-2)
Control Name: Windows Firewall: Domain: Settings: Apply local connection security rules
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
Registry Value: AllowLocalIPsecPolicyMerge
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
FirewallDomainProfileApplyLocalFirewallRules
(CCE-37860-4)
Control Name: Windows Firewall: Domain: Settings: Apply local firewall rules
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
Registry Value: AllowLocalPolicyMerge
Registry Value Type: REG_DWORD
Critical Domain Controller = "OneOf(Equals(1), Equals(null))"
Member Server = "OneOf(Equals(1), Equals(null))"
FirewallDomainProfileDisplayNotification
(CCE-38041-0)
Control Name: Windows Firewall: Domain: Settings: Display a notification
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
Registry Value: DisableNotifications
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
FirewallDomainProfileInboundConnection
(AZ-WIN-202252)
Control Name: Windows Firewall: Domain: Inbound connections
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
Registry Value: DefaultInboundAction
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
FirewallDomainProfileLogDroppedPackets
(AZ-WIN-202226)
Control Name: Windows Firewall: Domain: Logging: Log dropped packets
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging
Registry Value: LogDroppedPackets
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
FirewallDomainProfileLogFileMaxSize
(AZ-WIN-202225)
Control Name: Windows Firewall: Domain: Logging: Size limit (KB)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging
Registry Value: LogFileSize
Registry Value Type: REG_DWORD
Warning Domain Controller = "Range(16384, )"
Member Server = "Range(16384, )"
FirewallDomainProfileLogFileName
(AZ-WIN-202224)
Control Name: Windows Firewall: Domain: Logging: Name
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging
Registry Value: LogFilePath
Registry Value Type: REG_SZ
Informational Domain Controller = "Contains('.log')"
Member Server = "Contains('.log')"
FirewallDomainProfileLogSuccessfulConnections
(AZ-WIN-202227)
Control Name: Windows Firewall: Domain: Logging: Log successful connections
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging
Registry Value: LogSuccessfulConnections
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
FirewallDomainProfileOutboundConnection
(CCE-36146-9)
Control Name: Windows Firewall: Domain: Outbound connections
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
Registry Value: DefaultOutboundAction
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
FirewallDomainProfileState
(CCE-36062-8)
Control Name: Windows Firewall: Domain: Firewall state
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
Registry Value: EnableFirewall
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
FirewallDomainProfileUnicastResponse
(AZ-WIN-00088)
Control Name: Windows Firewall: Domain: Allow unicast response
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
Registry Value: DisableUnicastResponsesToMulticastBroadcast
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
FirewallPrivateProfileApplyLocalConnectionSecurityRules
(CCE-36063-6)
Control Name: Windows Firewall: Private: Settings: Apply local connection security rules
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
Registry Value: AllowLocalIPsecPolicyMerge
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPrivateProfileApplyLocalFirewallRules
(CCE-37438-9)
Control Name: Windows Firewall: Private: Settings: Apply local firewall rules
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
Registry Value: AllowLocalPolicyMerge
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPrivateProfileDisplayNotification
(CCE-37621-0)
Control Name: Windows Firewall: Private: Settings: Display a notification
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
Registry Value: DisableNotifications
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPrivateProfileInboundConnection
(AZ-WIN-202228)
Control Name: Windows Firewall: Private: Inbound connections
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
Registry Value: DefaultInboundAction
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPrivateProfileLogDroppedPackets
(AZ-WIN-202231)
Control Name: Windows Firewall: Private: Logging: Log dropped packets
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging
Registry Value: LogDroppedPackets
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPrivateProfileLogFileMaxSize
(AZ-WIN-202230)
Control Name: Windows Firewall: Private: Logging: Size limit (KB)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging
Registry Value: LogFileSize
Registry Value Type: REG_DWORD
Warning Domain Controller = "Range(16384, )"
Member Server = "Range(16384, )"
Workgroup Member = "Range(16384, )"
FirewallPrivateProfileLogFileName
(AZ-WIN-202229)
Control Name: Windows Firewall: Private: Logging: Name
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging
Registry Value: LogFilePath
Registry Value Type: REG_SZ
Informational Domain Controller = "Contains('.log')"
Member Server = "Contains('.log')"
Workgroup Member = "Contains('.log')"
FirewallPrivateProfileLogSuccessfulConnections
(AZ-WIN-202232)
Control Name: Windows Firewall: Private: Logging: Log successful connections
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging
Registry Value: LogSuccessfulConnections
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPrivateProfileOutboundConnection
(CCE-38332-3)
Control Name: Windows Firewall: Private: Outbound connections
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
Registry Value: DefaultOutboundAction
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
FirewallPrivateProfileState
(CCE-38239-0)
Control Name: Windows Firewall: Private: Firewall state
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
Registry Value: EnableFirewall
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPrivateProfileUnicastResponse
(AZ-WIN-00089)
Control Name: Windows Firewall: Private: Allow unicast response
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
Registry Value: DisableUnicastResponsesToMulticastBroadcast
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
FirewallPublicProfileApplyLocalConnectionSecurityRules
(CCE-36268-1)
Control Name: Windows Firewall: Public: Settings: Apply local connection security rules
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
Registry Value: AllowLocalIPsecPolicyMerge
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPublicProfileApplyLocalFirewallRules
(CCE-37861-2)
Control Name: Windows Firewall: Public: Settings: Apply local firewall rules
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
Registry Value: AllowLocalPolicyMerge
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPublicProfileDisplayNotification
(CCE-38043-6)
Control Name: Windows Firewall: Public: Settings: Display a notification
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
Registry Value: DisableNotifications
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPublicProfileInboundConnection
(AZ-WIN-202234)
Control Name: Windows Firewall: Public: Inbound connections
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
Registry Value: DefaultInboundAction
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPublicProfileLogDroppedPackets
(AZ-WIN-202237)
Control Name: Windows Firewall: Public: Logging: Log dropped packets
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging
Registry Value: LogDroppedPackets
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPublicProfileLogFileMaxSize
(AZ-WIN-202236)
Control Name: Windows Firewall: Public: Logging: Size limit (KB)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging
Registry Value: LogFileSize
Registry Value Type: REG_DWORD
Informational Domain Controller = "Range(16384, )"
Member Server = "Range(16384, )"
Workgroup Member = "Range(16384, )"
FirewallPublicProfileLogFileName
(AZ-WIN-202235)
Control Name: Windows Firewall: Public: Logging: Name
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging
Registry Value: LogFilePath
Registry Value Type: REG_SZ
Informational Domain Controller = "Contains('.log')"
Member Server = "Contains('.log')"
Workgroup Member = "Contains('.log')"
FirewallPublicProfileLogSuccessfulConnections
(AZ-WIN-202233)
Control Name: Windows Firewall: Public: Logging: Log successful connections
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging
Registry Value: LogSuccessfulConnections
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPublicProfileOutboundConnection
(CCE-37434-8)
Control Name: Windows Firewall: Public: Outbound connections
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
Registry Value: DefaultOutboundAction
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
FirewallPublicProfileState
(CCE-37862-0)
Control Name: Windows Firewall: Public: Firewall state
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
Registry Value: EnableFirewall
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
FirewallPublicProfileUnicastResponse
(AZ-WIN-00090)
Control Name: Windows Firewall: Public: Allow unicast response
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
Registry Value: DisableUnicastResponsesToMulticastBroadcast
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
ForceAuditPolicySubcategorySettingsToOverrideAuditPolicyCategorySettings
(CCE-37850-5)
Control Name: Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: SCENoApplyLegacyAuditPolicy
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Audit_ForceAuditPolicySubcategorySettingsToOverrideAuditPolicyCategorySettings
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
GroupPolicyDisableBackgroundPolicy
(CCE-14437-8)
Control Name: Turn off background refresh of Group Policy
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: DisableBkGndGroupPolicy
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
GroupPolicyEnableCDP
(AZ-WIN-00170)
Control Name: Continue experiences on this device
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
Registry Value: EnableCdp
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
GroupPolicyNoBackgroundPolicy
(CCE-36169-1)
Control Name: Configure registry policy processing: Do not apply during periodic background processing
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Group Policy{35378EAC-683F-11D2-A89A-00C04FBBCFA2}
Registry Value: NoBackgroundPolicy
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
GroupPolicyNoGPOListChanges
(CCE-36169-1a)
Control Name: Configure registry policy processing: Process even if the Group Policy objects have not changed
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Group Policy{35378EAC-683F-11D2-A89A-00C04FBBCFA2}
Registry Value: NoGPOListChanges
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
ICMNC_ExitOnISP
(CCE-37163-3)
Control Name: Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Internet Connection Wizard
Registry Value: ExitOnMSICW
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
ImpersonateClient
(AZ-WIN-73785)
Control Name: Impersonate a client after authentication
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ImpersonateClient
CSP Value Type: String
Important Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-6', '*S-1-5-19', '*S-1-5-20')"
Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-6', '*S-1-5-19', '*S-1-5-20')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-6', '*S-1-5-19', '*S-1-5-20')"
IPSourceRoutingProtectionLevel
(AZ-WIN-202244)
Control Name: MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Registry Value: DisableIPSourceRouting
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(2)"
Member Server = "Equals(2)"
Workgroup Member = "Equals(2)"
IPv6SourceRoutingProtectionLevel
(AZ-WIN-202213)
Control Name: MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters
Registry Value: DisableIPSourceRouting
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(2)"
Member Server = "Equals(2)"
Workgroup Member = "Equals(2)"
KDCHashAlgorithms Control Name: Configure hash algorithms for certificate logon (KDC)
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters
Registry Value: PKINITHashAlgorithmConfigurationEnabled
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
KDCHashAlgorithmsSHA1 Control Name: Configure hash algorithms for certificate logon (KDC) - SHA1
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters
Registry Value: PKINITSHA1
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
KDCHashAlgorithmsSHA256 Control Name: Configure hash algorithms for certificate logon (KDC) - SHA256
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters
Registry Value: PKINITSHA256
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
KDCHashAlgorithmsSHA384 Control Name: Configure hash algorithms for certificate logon (KDC) - SHA384
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters
Registry Value: PKINITSHA384
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
KDCHashAlgorithmsSHA512 Control Name: Configure hash algorithms for certificate logon (KDC) - SHA512
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters
Registry Value: PKINITSHA512
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
KerberosHashAlgorithms Control Name: Configure hash algorithms for certificate logon (Kerberos)
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters
Registry Value: PKINITHashAlgorithmConfigurationEnabled
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
KerberosHashAlgorithmsSHA1 Control Name: Configure hash algorithms for certificate logon (Kerberos) - SHA1
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters
Registry Value: PKINITSHA1
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
KerberosHashAlgorithmsSHA256 Control Name: Configure hash algorithms for certificate logon (Kerberos) - SHA256
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters
Registry Value: PKINITSHA256
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
KerberosHashAlgorithmsSHA384 Control Name: Configure hash algorithms for certificate logon (Kerberos) - SHA384
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters
Registry Value: PKINITSHA384
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
KerberosHashAlgorithmsSHA512 Control Name: Configure hash algorithms for certificate logon (Kerberos) - SHA512
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters
Registry Value: PKINITSHA512
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
LANManagerAuthenticationLevel
(CCE-36173-3)
Control Name: Network security: LAN Manager authentication level
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: LmCompatibilityLevel
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevel
CSP Value Type: Integer
Critical Domain Controller = "Equals(5)"
Member Server = "Equals(5)"
Workgroup Member = "Equals(5)"
LanmanWorkstationEnableInsecureGuestLogons
(AZ-WIN-00171)
Control Name: Enable insecure guest logons
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanWorkstation
Registry Value: AllowInsecureGuestAuth
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LanmanWorkstation/EnableInsecureGuestLogons
CSP Value Type: Integer
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
LDAPClientSigningRequirements
(CCE-36858-9)
Control Name: Network security: LDAP client signing requirements
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LDAP
Registry Value: LDAPClientIntegrity
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkSecurity_LDAPClientSigningRequirements
CSP Value Type: Integer
Critical Domain Controller = "Range(1, 2)"
Member Server = "Range(1, 2)"
Workgroup Member = "Range(1, 2)"
LDAPServerChannelBindingTokenRequirements Control Name: Domain controller: LDAP server channel binding token requirements
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
Registry Value: LdapEnforceChannelBinding
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(2)"
LDAPServerLDAPServerIntegritySigningRequirementsEnforcement Control Name: Domain controller: LDAP server signing requirements enforcement
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
Registry Value: LDAPServerEnforceIntegrity
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
LetEveryonePermissionsApplyToAnonymousUsers
(CCE-36148-5)
Control Name: Network access: Let Everyone permissions apply to anonymous users
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: EveryoneIncludesAnonymous
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly
(CCE-37615-2)
Control Name: Accounts: Limit local account use of blank passwords to console logon only
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: LimitBlankPasswordUse
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(null))"
Member Server = "OneOf(Equals(1), Equals(null))"
Workgroup Member = "OneOf(Equals(1), Equals(null))"
LogonBlockUserFromShowingAccountDetailsOnSignin
(AZ-WIN-00138)
Control Name: Block user from showing account details on sign-in
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
Registry Value: BlockUserFromShowingAccountDetailsOnSignin
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
LogonDontEnumerateConnectedUsers
(AZ-WIN-202216)
Control Name: Do not enumerate connected users on domain-joined computers
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
Registry Value: DontEnumerateConnectedUsers
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
LSAPPLProtection Control Name: Enable LSA PPL Protection
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: RunAsPPL
Registry Value Type: REG_DWORD
Critical Domain Controller = "Range(1, 2)"
Member Server = "Range(1, 2)"
Workgroup Member = "Range(1, 2)"
MachineInactivityLimit
(AZ-WIN-73645)
Control Name: Interactive logon: Machine inactivity limit
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: InactivityTimeoutSecs
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit
CSP Value Type: Integer
Important Domain Controller = "Range(1, 900)"
Member Server = "Range(1, 900)"
Workgroup Member = "Range(1, 900)"
MaximumMachineAccountPasswordAge
(CCE-37431-4)
Control Name: Domain member: Maximum machine account password age
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters
Registry Value: MaximumPasswordAge
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/DomainMember_MaximumMachineAccountPasswordAge
CSP Value Type: Integer
Critical Domain Controller = "Equals(30)"
Member Server = "Equals(30)"
MessageTextUserLogon
(AZ-WIN-202253)
Control Name: Interactive logon: Message text for users attempting to log on
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: LegalNoticeText
Registry Value Type: REG_SZ
Warning Domain Controller = "Not(OneOf(Equals(''), Equals(null)))"
Member Server = "Not(OneOf(Equals(''), Equals(null)))"
Workgroup Member = "Not(OneOf(Equals(''), Equals(null)))"
MessageTextUserLogonTitle
(AZ-WIN-20225)
Control Name: Interactive logon: Message title for users attempting to log on
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: LegalNoticeCaption
Registry Value Type: REG_SZ
Warning Domain Controller = "Not(OneOf(Equals(''), Equals(null)))"
Member Server = "Not(OneOf(Equals(''), Equals(null)))"
Workgroup Member = "Not(OneOf(Equals(''), Equals(null)))"
MinimumSessionSecurityForNTLMSSPBasedClients
(CCE-37553-5)
Control Name: Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0
Registry Value: NTLMMinClientSec
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClients
CSP Value Type: Integer
Critical Domain Controller = "Equals(537395200)"
Member Server = "Equals(537395200)"
Workgroup Member = "Equals(537395200)"
MinimumSessionSecurityForNTLMSSPBasedServers
(CCE-37835-6)
Control Name: Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0
Registry Value: NTLMMinServerSec
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers
CSP Value Type: Integer
Critical Domain Controller = "Equals(537395200)"
Member Server = "Equals(537395200)"
Workgroup Member = "Equals(537395200)"
MinimumSMBClientVersion Control Name: Mandate the minimum version of SMB Client
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanWorkstation
Registry Value: MinSmb2Dialect
Registry Value Type: REG_DWORD
Critical Domain Controller = "OneOf(Equals(768),Equals(770),Equals(785))"
Member Server = "OneOf(Equals(768),Equals(770),Equals(785))"
Workgroup Member = "OneOf(Equals(768),Equals(770),Equals(785))"
MinimumSMBServerVersion Control Name: Mandate the minimum version of SMB Server
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanServer
Registry Value: MinSmb2Dialect
Registry Value Type: REG_DWORD
Critical Domain Controller = "OneOf(Equals(768),Equals(770),Equals(785))"
Member Server = "OneOf(Equals(768),Equals(770),Equals(785))"
Workgroup Member = "OneOf(Equals(768),Equals(770),Equals(785))"
MitigationOptionsFontBlocking Control Name: WindowsNT MitigationOptions MitigationOptions FontBocking
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\MitigationOptions
Registry Value: MitigationOptions_FontBocking
Registry Value Type: REG_SZ
Critical Domain Controller = "Equals('1000000000000')"
Member Server = "Equals('1000000000000')"
Workgroup Member = "Equals('1000000000000')"
NetBTNodeTypeConfiguration
(AZ-WIN-202211)
Control Name: NetBT NodeType configuration
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\NetBT\Parameters
Registry Value: NodeType
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(2)"
Member Server = "Equals(2)"
NetworkConnectionsNC_ShowSharedAccessUI
(AZ-WIN-00172)
Control Name: Prohibit use of Internet Connection Sharing on your DNS domain network
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Network Connections
Registry Value: NC_ShowSharedAccessUI
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
NetworkProviderHardenedPathsNETLOGON
(AZ-WIN-202250)
Control Name: Hardened UNC Paths - NETLOGON
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths
Registry Value: \*\NETLOGON
Registry Value Type: REG_SZ
Warning Domain Controller = "OneOf(Equals('RequireMutualAuthentication=1, RequireIntegrity=1')
,Equals('RequireMutualAuthentication=1, RequireIntegrity=1, RequirePrivacy=1'))"
Member Server = "OneOf(Equals('RequireMutualAuthentication=1, RequireIntegrity=1')
,Equals('RequireMutualAuthentication=1, RequireIntegrity=1, RequirePrivacy=1'))"
NetworkProviderHardenedPathsSYSVOL
(AZ-WIN-202251)
Control Name: Hardened UNC Paths - SYSVOL
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths
Registry Value: \*\SYSVOL
Registry Value Type: REG_SZ
Warning Domain Controller = "OneOf(Equals('RequireMutualAuthentication=1, RequireIntegrity=1'),
Equals('RequireMutualAuthentication=1, RequireIntegrity=1, RequirePrivacy=1'))"
Member Server = "OneOf(Equals('RequireMutualAuthentication=1, RequireIntegrity=1'),
Equals('RequireMutualAuthentication=1, RequireIntegrity=1, RequirePrivacy=1'))"
NetworkSecurityForceLogoffWhenLogonHoursExpire Control Name: Network security: Force logoff when logon hours expire
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkSecurity_ForceLogoffWhenLogonHoursExpire
CSP Value Type: Integer
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations
(CCE-37057-7)
Control Name: User Account Control: Only elevate UIAccess applications that are installed in secure locations
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: EnableSecureUIAPaths
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
OverrideMinimumEnabledDTLSVersionClient Control Name: Override Minimum Enabled DTLS Version Client
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Cryptography/OverrideMinimumEnabledDTLSVersionClient
CSP Value Type: String
Important Domain Controller = "Equals('1.2')"
Member Server = "Equals('1.2')"
Workgroup Member = "Equals('1.2')"
OverrideMinimumEnabledDTLSVersionServer Control Name: Override Minimum Enabled DTLS Version Server
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Cryptography/OverrideMinimumEnabledDTLSVersionServer
CSP Value Type: String
Critical Domain Controller = "Equals('1.2')"
Member Server = "Equals('1.2')"
Workgroup Member = "Equals('1.2')"
OverrideMinimumEnabledTLSVersionClient Control Name: Override Minimum Enabled TLS Version Client
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Cryptography/OverrideMinimumEnabledTLSVersionClient
CSP Value Type: String
Critical Domain Controller = "OneOf(Equals('1.2'),Equals('1.3'))"
Member Server = "OneOf(Equals('1.2'),Equals('1.3'))"
Workgroup Member = "OneOf(Equals('1.2'),Equals('1.3'))"
OverrideMinimumEnabledTLSVersionServer Control Name: Override Minimum Enabled TLS Version Server
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Cryptography/OverrideMinimumEnabledTLSVersionServer
CSP Value Type: String
Critical Domain Controller = "OneOf(Equals('1.2'),Equals('1.3'))"
Member Server = "OneOf(Equals('1.2'),Equals('1.3'))"
Workgroup Member = "OneOf(Equals('1.2'),Equals('1.3'))"
PowerShellExecutionPolicyEnableTranscripting
(AZ-WIN-202208)
Control Name: Turn on PowerShell Transcription
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription
Registry Value: EnableTranscripting
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters
(CCE-37942-0)
Control Name: Devices: Prevent users from installing printer drivers
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Print\Providers\LanMan Print Services\Servers
Registry Value: AddPrinterDrivers
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters
CSP Value Type: Integer
Warning Domain Controller = "OneOf(Equals(1), Equals(null))"
Member Server = "OneOf(Equals(1), Equals(null))"
Workgroup Member = "OneOf(Equals(1), Equals(null))"
PrintersRestrictDriverInstallationToAdministrators
(AZ-WIN-202202)
Control Name: Limits print driver installation to Administrators
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
Registry Value: RestrictDriverInstallationToAdministrators
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
PrivacyAllowInputPersonalization
(AZ-WIN-00168)
Control Name: Allow Input Personalization
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\InputPersonalization
Registry Value: AllowInputPersonalization
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/Privacy/AllowInputPersonalization
CSP Value Type: Integer
Warning Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
PromptUserToChangePasswordBeforeExpiration
(CCE-10930-6)
Control Name: Interactive logon: Prompt user to change password before expiration
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
Registry Value: PasswordExpiryWarning
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/InteractiveLogon_PromptUserToChangePasswordBeforeExpiration
CSP Value Type: Integer
Informational Domain Controller = "Range(5, 14)"
Member Server = "Range(5, 14)"
Workgroup Member = "Range(5, 14)"
RDPPortNumber
(AZ-WIN-00156)
Control Name: Detect change from default RDP port
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
Registry Value: PortNumber
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(3389)"
Member Server = "Equals(3389)"
Workgroup Member = "Equals(3389)"
RecoveryConsoleAllowFloppyCopyAndAllDrives
(AZ-WIN-00148)
Control Name: Recovery console: Allow floppy copy and access to all drives and all folders
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole
Registry Value: SetCommand
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/RecoveryConsole_AllowFloppyCopyAndAccessToAllDrivesAndAllFolders
CSP Value Type: Integer
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
RefuseMachineAccountPasswordChanged Control Name: Domain controller: Refuse machine account password changes
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
Registry Value: RefusePasswordChange
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
RemoteAssistanceSolicitedRemoteAssistance
(CCE-37281-3)
Control Name: Configure Solicited Remote Assistance
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
Registry Value: fAllowToGetHelp
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
RemoteAssistanceUnsolicitedRemoteAssistance
(CCE-36388-7)
Control Name: Configure Offer Remote Assistance
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
Registry Value: fAllowUnsolicited
Registry Value Type: REG_DWORD
Warning Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
RemoteDesktopServicesClientConnectionEncryptionLevel
(CCE-36627-8)
Control Name: Set client connection encryption level
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
Registry Value: MinEncryptionLevel
Registry Value Type: REG_DWORD
Critical Domain Controller = "Range(3,4)"
Member Server = "Range(3,4)"
Workgroup Member = "Range(3,4)"
RemoteDesktopServicesDoNotAllowDriveRedirection
(AZ-WIN-73569)
Control Name: Do not allow drive redirection
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
Registry Value: fDisableCdm
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
RemoteDesktopServicesDoNotAllowPasswordSaving
(CCE-36223-6)
Control Name: Do not allow passwords to be saved
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
Registry Value: DisablePasswordSaving
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
RemoteDesktopServicesPromptForPasswordUponConnection
(CCE-37929-7)
Control Name: Always prompt for password upon connection
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
Registry Value: fPromptForPassword
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
RemoteDesktopServicesRequireSecureRPCCommunication
(CCE-37567-5)
Control Name: Require secure RPC communication
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
Registry Value: fEncryptRPCTraffic
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
RemotelyAccessibleRegistryPaths
(CCE-37194-8)
Control Name: Network access: Remotely accessible registry paths
Registry Key: HKLM:\SYSTEM\CurrentControlSet\SecurePipeServers\WinReg\AllowedExactPaths
Registry Value: Machine
Registry Value Type: REG_MULTI_SZ
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkAccess_RemotelyAccessibleRegistryPaths
CSP Value Type: MultiString
Critical Domain Controller = "OneOf(Equals('System\CurrentControlSet\Control
\ProductOptions,System\CurrentControlSet\Control\Server Applications,Software\Microsoft\Windows NT\CurrentVersion'), Equals(''))"
Member Server = "OneOf(Equals('System\CurrentControlSet\Control
\ProductOptions,System\CurrentControlSet\Control\Server Applications,Software\Microsoft\Windows NT\CurrentVersion'), Equals(''))"
Workgroup Member = "OneOf(Equals('System\CurrentControlSet\Control\ProductOptions,System\CurrentControlSet\Control
\Server Applications,Software\Microsoft\Windows NT\CurrentVersion'), Equals(''))"
RemotelyAccessibleRegistryPathsAndSubpaths
(CCE-36347-3)
Control Name: Network access: Remotely accessible registry paths and sub-paths
Registry Key: HKLM:\SYSTEM\CurrentControlSet\SecurePipeServers\WinReg\AllowedPaths
Registry Value: Machine
Registry Value Type: REG_MULTI_SZ
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkAccess_RemotelyAccessibleRegistryPathsAndSubpaths
CSP Value Type: MultiString
Critical Domain Controller = "OneOf(Equals('System\CurrentControlSet\Control\Print\Printers,System
\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion\Print,Software\Microsoft\Windows NT\CurrentVersion\Windows,System\CurrentControlSet\Control\ContentIndex,System\CurrentControlSet\Control
\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration,Software\Microsoft\Windows NT\CurrentVersion\Perflib,System\CurrentControlSet\Services\SysmonLog'), Equals(''))"
Member Server = "OneOf(Equals('System\CurrentControlSet\Control\Print\Printers,System
\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion\Print,Software\Microsoft\Windows NT\CurrentVersion\Windows,System\CurrentControlSet\Control\ContentIndex,System\CurrentControlSet\Control
\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration,Software\Microsoft\Windows NT\CurrentVersion\Perflib,System\CurrentControlSet\Services\SysmonLog'), Equals(''))"
Workgroup Member = "OneOf(Equals('System\CurrentControlSet\Control\Print\Printers,System
\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion\Print,Software\Microsoft\Windows NT\CurrentVersion\Windows,System\CurrentControlSet\Control
\ContentIndex,System\CurrentControlSet\Control\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration,Software\Microsoft\Windows NT\CurrentVersion\Perflib,System\CurrentControlSet\Services\SysmonLog'), Equals(''))"
RemoteManagementAllowBasicAuthentication_Client
(CCE-36254-1)
Control Name: Remote management (WinRM) Allow Basic authentication
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Client
Registry Value: AllowBasic
Registry Value Type: REG_DWORD
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
RemoteManagementAllowBasicAuthentication_Service
(AZ-WIN-73599)
Control Name: Remote management (WinRM) Allow Basic authentication - Service
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service
Registry Value: AllowBasic
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
RemoteManagementAllowRemoteServerManagement Control Name: Allow remote server management through WinRM
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service
Registry Value: AllowAutoConfig
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
RemoteManagementAllowRemoteServerManagement_IPv4Filter Control Name: Allow remote server management through WinRM-IPv4Filter
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service
Registry Value: IPv4Filter
Registry Value Type: REG_SZ
Informational Domain Controller = "ContainsAtLeast('')"
Member Server = "ContainsAtLeast('
')"
Workgroup Member = "ContainsAtLeast('*')"
RemoteManagementAllowRemoteServerManagement_IPv6Filter Control Name: Allow remote server management through WinRM-IPv6Filter
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service
Registry Value: IPv6Filter
Registry Value Type: REG_SZ
Informational Domain Controller = "ContainsAtLeast('')"
Member Server = "ContainsAtLeast('
')"
Workgroup Member = "ContainsAtLeast('*')"
RemoteManagementAllowUnencryptedTraffic_Client
(CCE-38223-4)
Control Name: Remote management (WinRM) Allow unencrypted traffic
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Client
Registry Value: AllowUnencryptedTraffic
Registry Value Type: REG_DWORD
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
RemoteManagementAllowUnencryptedTraffic_Service
(AZ-WIN-73601)
Control Name: Remote management (WinRM) Allow unencrypted traffic - Service
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service
Registry Value: AllowUnencryptedTraffic
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
RemoteManagementDisallowDigestAuthentication
(CCE-38318-2)
Control Name: Remote management (WinRM) Disallow Digest authentication
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Client
Registry Value: AllowDigest
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(0)"
Member Server = "Equals(0)"
Workgroup Member = "Equals(0)"
RemoteManagementDisallowStoringOfRunAsCredentials
(CCE-36000-8)
Control Name: Remote management (WinRM) Disallow WinRM from storing RunAs credentials
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service
Registry Value: DisableRunAs
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
RemoteProcedureCallRestrictUnauthenticatedRPCClients
(AZ-WIN-73541)
Control Name: Restrict Unauthenticated RPC clients
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Rpc
Registry Value: RestrictRemoteClients
Registry Value Type: REG_DWORD
Critical Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
RenameAdministratorAccount
(CCE-10976-9)
Control Name: Accounts: Rename administrator account
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount
CSP Value Type: String
Warning Domain Controller = "Not(Equals('Administrator'))"
Member Server = "Not(Equals('Administrator'))"
Workgroup Member = "Not(Equals('Administrator'))"
RenameGuestAccount
(AZ-WIN-202255)
Control Name: Accounts: Rename guest account
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount
CSP Value Type: String
Warning Domain Controller = "Not(Equals('Guest'))"
Member Server = "Not(Equals('Guest'))"
Workgroup Member = "Not(Equals('Guest'))"
RequireCaseInsensitivityForNonWindowsSubsystems
(CCE-37885-1)
Control Name: System objects: Require case insensitivity for non-Windows subsystems
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Kernel
Registry Value: ObCaseInsensitive
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems
CSP Value Type: Integer
Warning Domain Controller = "OneOf(Equals(1), Equals(null))"
Member Server = "OneOf(Equals(1), Equals(null))"
Workgroup Member = "OneOf(Equals(1), Equals(null))"
RequireEncryption Control Name: Require Encryption
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\LanmanWorkstation
Registry Value: RequireEncryption
Registry Value Type: REG_DWORD
Warning Domain Controller = "Range(0, 1)"
Member Server = "Range(0, 1)"
Workgroup Member = "Range(0, 1)"
RequireStrongSessionKey
(CCE-37614-5)
Control Name: Domain member: Require strong (Windows 2000 or later) session key
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
Registry Value: RequireStrongKey
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/DomainMember_RequireStrongSessionKey
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
RestrictAnonymousAccessToNamedPipesAndShares
(CCE-36021-4)
Control Name: Network access: Restrict anonymous access to Named Pipes and Shares
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters
Registry Value: RestrictNullSessAccess
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(1), Equals(null))"
Member Server = "OneOf(Equals(1), Equals(null))"
Workgroup Member = "OneOf(Equals(1), Equals(null))"
RestrictClientsAllowedToMakeRemoteCallsToSAM
(AZ-WIN-00142)
Control Name: Network access: Restrict clients allowed to make remote calls to SAM
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: RestrictRemoteSAM
Registry Value Type: REG_SZ
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM
CSP Value Type: String
Critical Member Server = "OneOf(Equals('O:BAG:BAD:(A;;RC;;;BA)'), Equals(''))"
Workgroup Member = "OneOf(Equals('O:BAG:BAD:(A;;RC;;;BA)'), Equals(''))"
RSSDisableEnclosureDownload
(CCE-37126-0)
Control Name: Prevent downloading of enclosures
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Internet Explorer\Feeds
Registry Value: DisableEnclosureDownload
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
RunAllAdministratorsInAdminApprovalMode
(CCE-36869-6)
Control Name: User Account Control: Run all administrators in Admin Approval Mode
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: EnableLUA
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
SafeDllSearchMode
(AZ-WIN-202215)
Control Name: MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager
Registry Value: SafeDllSearchMode
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
SAMRPCPasswordChangePolicy Control Name: Configure SAM change password RPC methods policy
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SAM
Registry Value: SamrChangeUserPasswordApiPolicy
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(2)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
SearchAllowIndexingEncryptedStoresOrItems
(CCE-38277-0)
Control Name: Allow indexing of encrypted files
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search
Registry Value: AllowIndexingEncryptedStoresOrItems
Registry Value Type: REG_DWORD
Warning Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
SendUnencryptedPasswordToThirdPartySMBServers
(CCE-37863-8)
Control Name: Microsoft network client: Send unencrypted password to third-party SMB servers
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters
Registry Value: EnablePlainTextPassword
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
ServerSPNTargetNameValidationLevel
(CCE-10617-9)
Control Name: Microsoft network server: Server SPN target name validation level
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters
Registry Value: SmbServerNameHardeningLevel
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/MicrosoftNetworkServer_ServerSPNTargetNameValidationLevel
CSP Value Type: Integer
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
SharesThatCanBeAccessedAnonymously
(CCE-38095-6)
Control Name: Network access: Shares that can be accessed anonymously
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters
Registry Value: NullSessionShares
Registry Value Type: REG_MULTI_SZ
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkAccess_SharesThatCanBeAccessedAnonymously
CSP Value Type: MultiString
Critical Domain Controller = "OneOf(Equals(''), Equals(null))"
Member Server = "OneOf(Equals(''), Equals(null))"
Workgroup Member = "OneOf(Equals(''), Equals(null))"
SharingAndSecurityModelForLocalAccounts
(CCE-37623-6)
Control Name: Network access: Sharing and security model for local accounts
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: ForceGuest
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/NetworkAccess_SharingAndSecurityModelForLocalAccounts
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
ShellDataExecutionPrevention
(CCE-37809-1)
Control Name: Turn off Data Execution Prevention for Explorer
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Explorer
Registry Value: NoDataExecutionPrevention
Registry Value Type: REG_DWORD
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
ShutdownSystemImmediatelyIfUnableToLogSecurityAudits
(CCE-35907-5)
Control Name: Audit: Shut down system immediately if unable to log security audits
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
Registry Value: CrashOnAuditFail
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/Audit_ShutdownSystemImmediatelyIfUnableToLogSecurityAudits
CSP Value Type: Integer
Critical Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
SmartCardRemovalBehavior
(AZ-WIN-73807)
Control Name: Interactive logon: Smart card removal behavior
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Registry Value: ScRemoveOption
Registry Value Type: REG_SZ
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior
CSP Value Type: String
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
SmartScreenEnableSmartScreenInShell
(CCE-35859-8)
Control Name: Configure Windows Defender SmartScreen
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
Registry Value: EnableSmartScreen
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
SmartScreenPreventOverrideForFilesInShell Control Name: Configure Windows Defender SmartScreen - Warn and Prevent bypass (Added)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
Registry Value: ShellSmartScreenLevel
Registry Value Type: REG_SZ
Important Domain Controller = "Equals('Block')"
Member Server = "Equals('Block')"
Workgroup Member = "Equals('Block')"
StrengthenDefaultPermissionsOfInternalSystemObjects
(CCE-37644-2)
Control Name: System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager
Registry Value: ProtectionMode
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/SystemObjects_StrengthenDefaultPermissionsOfInternalSystemObjects
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
SwitchToTheSecureDesktopWhenPromptingForElevation
(CCE-36866-2)
Control Name: User Account Control: Switch to the secure desktop when prompting for elevation
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: PromptOnSecureDesktop
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
SystemAllowTelemetry
(AZ-WIN-00169)
Control Name: Allow Diagnostic Data
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection
Registry Value: AllowTelemetry
Registry Value Type: REG_DWORD
Warning Domain Controller = "Range(0, 1)"
Member Server = "Range(0, 1)"
Workgroup Member = "Range(0, 1)"
SystemBootStartDriverInitialization
(CCE-37912-3)
Control Name: Boot-Start Driver Initialization Policy
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Policies\EarlyLaunch
Registry Value: DriverLoadPolicy
Registry Value Type: REG_DWORD
Warning Domain Controller = "OneOf(Equals(8),Equals(1),Equals(3),Equals(null))"
Member Server = "OneOf(Equals(8),Equals(1),Equals(3),Equals(null))"
Workgroup Member = "OneOf(Equals(8),Equals(1),Equals(3),Equals(null))"
SystemEnableSoftwareRestrictionPolicies
(AZ-WIN-00155)
Control Name: System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Registry Value: AuthenticodeEnabled
Registry Value Type: REG_DWORD
Warning Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
SystemLogonCacheSize
(AZ-WIN-73651)
Control Name: Interactive Logon: Number of previous logons to cache (in case Domain Controller is not available)
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Registry Value: CachedLogonsCount
Registry Value Type: REG_SZ
Informational Member Server = "Range(0, 4)"
SystemMinimizeInternetConnections
(CCE-38338-0)
Control Name: Minimize the number of simultaneous connections to the Internet or a Windows Domain
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\WcmSvc\GroupPolicy
Registry Value: fMinimizeConnections
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(3)"
Member Server = "Equals(3)"
Workgroup Member = "Equals(3)"
SystemWindowsSearchService
(AZ-WIN-00176)
Control Name: Disable Windows Search Service
Registry Key: HKLM:\SYSTEM\CurrentControlSet\Services\Wsearch
Registry Value: Start
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(4)"
Member Server = "Equals(4)"
Workgroup Member = "Equals(4)"
TerminalServerTS_TEMP_DELETE
(CCE-37946-1)
Control Name: Do not delete temp folders upon exit
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
Registry Value: DeleteTempDirsOnExit
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
TerminalServerTS_TEMP_PER_SESSION
(CCE-38180-6)
Control Name: Do not use temporary folders per session
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
Registry Value: PerSessionTempDir
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
TerminalServerTS_USER_AUTHENTICATION_POLICY
(AZ-WIN-00149)
Control Name: Require user authentication for remote connections by using Network Level Authentication
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
Registry Value: UserAuthentication
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
TurnOff_Windows_Error_Reporting
(AZ-WIN-73543)
Control Name: Turn off Inventory Collector
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\AppCompat
Registry Value: DisableInventory
Registry Value Type: REG_DWORD
Informational Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
TurnOffPrintingOverHTTP
(AZ-WIN-73529)
Control Name: Turn off printing over HTTP
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers
Registry Value: DisableHTTPPrinting
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
UseAdminApprovalMode
(CCE-36494-3)
Control Name: User Account Control: Admin Approval Mode for the Built-in Administrator account
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: FilterAdministratorToken
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalMode
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
UserRightsAccessCredentialManagerAsTrustedCaller
(CCE-37056-9)
Control Name: Access Credential Manager as a trusted caller
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/AccessCredentialManagerAsTrustedCaller
CSP Value Type: String
Warning Domain Controller = "Equals('')"
Member Server = "Equals('')"
Workgroup Member = "Equals('')"
UserRightsAccessFromNetwork
(CCE-35818-4)
Control Name: Access this computer from the network
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/AccessFromNetwork
CSP Value Type: String
Critical Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-11', '*S-1-5-9')"
Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-11')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-11')"
UserRightsActAsPartOfTheOperatingSystem
(CCE-36876-1)
Control Name: Act as part of the operating system
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ActAsPartOfTheOperatingSystem
CSP Value Type: String
Critical Domain Controller = "Equals('')"
Member Server = "Equals('')"
Workgroup Member = "Equals('')"
UserRightsAdjustMemoryQuotasForProcess
(CCE-10849-8)
Control Name: Adjust memory quotas for a process
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/AdjustMemoryQuotasForProcess
CSP Value Type: String
Warning Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-19', '*S-1-5-20')"
Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-19', '*S-1-5-20')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-19', '*S-1-5-20')"
UserRightsAllowLocalLogOn
(CCE-37659-0)
Control Name: Allow log on locally
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/AllowLocalLogOn
CSP Value Type: String
Critical Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-9')"
Member Server = "ContainsAtMost('*S-1-5-32-544')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544')"
UserRightsAllowLogOnThroughRemoteDesktop
(CCE-37072-6)
Control Name: Allow log on through Remote Desktop Services
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/AllowLogOnThroughRemoteDesktop
CSP Value Type: String
Critical Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-32-555')"
Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-32-555')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-32-555')"
UserRightsBackupFilesAndDirectories
(CCE-35912-5)
Control Name: Back up files and directories
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/BackupFilesAndDirectories
CSP Value Type: String
Critical Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
UserRightsBypassTraverseChecking
(AZ-WIN-00184)
Control Name: Bypass traverse checking
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/BypassTraverseChecking
CSP Value Type: String
Critical Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-11', '*S-1-5-32-551', '*S-1-5-19', '*S-1-5-20')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-11', '*S-1-5-32-551', '*S-1-5-19', '*S-1-5-20')"
UserRightsChangeSystemTime
(CCE-37452-0)
Control Name: Change the system time
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ChangeSystemTime
CSP Value Type: String
Critical Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-32-549', '*S-1-5-19')"
Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-32-549', '*S-1-5-19')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-32-549', '*S-1-5-19')"
UserRightsChangeTimeZone
(CCE-37700-2)
Control Name: Change the time zone
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ChangeTimeZone
CSP Value Type: String
Critical Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-19')"
Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-19')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-19')"
UserRightsCreateGlobalObjects
(CCE-37453-8)
Control Name: Create global objects
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/CreateGlobalObjects
CSP Value Type: String
Warning Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-6', '*S-1-5-19', '*S-1-5-20')"
Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-6', '*S-1-5-19', '*S-1-5-20')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-6', '*S-1-5-19', '*S-1-5-20')"
UserRightsCreatePageFile
(CCE-35821-8)
Control Name: Create a pagefile
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/CreatePageFile
CSP Value Type: String
Critical Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
UserRightsCreatePermanentSharedObjects
(CCE-36532-0)
Control Name: Create permanent shared objects
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/CreatePermanentSharedObjects
CSP Value Type: String
Warning Domain Controller = "Equals('')"
Member Server = "Equals('')"
Workgroup Member = "Equals('')"
UserRightsCreateSymbolicLinks
(CCE-35823-4)
Control Name: Create symbolic links
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/CreateSymbolicLinks
CSP Value Type: String
Critical Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-83-0')"
Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-83-0')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-83-0')"
UserRightsCreateToken
(CCE-36861-3)
Control Name: Create a token object
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/CreateToken
CSP Value Type: String
Warning Domain Controller = "Equals('')"
Member Server = "Equals('')"
Workgroup Member = "Equals('')"
UserRightsDebugPrograms
(AZ-WIN-73755)
Control Name: Debug programs
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/DebugPrograms
CSP Value Type: String
Critical Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
UserRightsDenyAccessFromNetwork
(CCE-37954-5)
Control Name: Deny access to this computer from the network
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/DenyAccessFromNetwork
CSP Value Type: String
Critical Domain Controller = "ContainsAtLeast('*S-1-5-32-546')"
Member Server = "ContainsAtLeast('*S-1-5-32-546')"
Workgroup Member = "ContainsAtLeast('*S-1-5-32-546')"
UserRightsDenyLocalLogOn
(CCE-37146-8)
Control Name: Deny log on locally
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/DenyLocalLogOn
CSP Value Type: String
Critical Domain Controller = "ContainsAtLeast('*S-1-5-32-546')"
Member Server = "ContainsAtLeast('*S-1-5-32-546')"
Workgroup Member = "ContainsAtLeast('*S-1-5-32-546')"
UserRightsDenyLogOnAsBatchJob
(CCE-36923-1)
Control Name: Deny log on as a batch job
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/DenyLogOnAsBatchJob
CSP Value Type: String
Critical Domain Controller = "ContainsAtLeast('*S-1-5-32-546')"
Member Server = "ContainsAtLeast('*S-1-5-32-546')"
Workgroup Member = "ContainsAtLeast('*S-1-5-32-546')"
UserRightsDenyLogOnAsService
(CCE-36877-9)
Control Name: Deny log on as a service
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/DenyLogOnAsService
CSP Value Type: String
Critical Domain Controller = "ContainsAtLeast('*S-1-5-32-546')"
Member Server = "ContainsAtLeast('*S-1-5-32-546')"
Workgroup Member = "ContainsAtLeast('*S-1-5-32-546')"
UserRightsDenyRemoteDesktopServicesLogOn
(CCE-36867-0)
Control Name: Deny log on through Remote Desktop Services
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/DenyRemoteDesktopServicesLogOn
CSP Value Type: String
Critical Domain Controller = "ContainsAtLeast('*S-1-5-32-546')"
Member Server = "ContainsAtLeast('*S-1-5-32-546')"
Workgroup Member = "ContainsAtLeast('*S-1-5-32-546')"
UserRightsEnableDelegation
(CCE-36860-5)
Control Name: Enable computer and user accounts to be trusted for delegation
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/EnableDelegation
CSP Value Type: String
Critical Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "Equals('')"
Workgroup Member = "Equals('')"
UserRightsGenerateSecurityAudits
(CCE-37639-2)
Control Name: Generate security audits
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/GenerateSecurityAudits
CSP Value Type: String
Critical Domain Controller = "ContainsAtMost('*S-1-5-19', '*S-1-5-20', '*S-1-5-82-3006700770-424185619-1745488364-794895919-4004696415')"
Member Server = "ContainsAtMost('*S-1-5-19', '*S-1-5-20', '*S-1-5-82-3006700770-424185619-1745488364-794895919-4004696415')"
Workgroup Member = "ContainsAtMost('*S-1-5-19', '*S-1-5-20', '*S-1-5-82-3006700770-424185619-1745488364-794895919-4004696415')"
UserRightsIncreaseProcessWorkingSet
(AZ-WIN-00185)
Control Name: Increase a process working set
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/IncreaseProcessWorkingSet
CSP Value Type: String
Warning Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-19')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-19')"
UserRightsIncreaseSchedulingPriority
(CCE-38326-6)
Control Name: Increase scheduling priority
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/IncreaseSchedulingPriority
CSP Value Type: String
Warning Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-90-0')"
Member Server = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-90-0')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-90-0')"
UserRightsLoadUnloadDeviceDrivers
(CCE-36318-4)
Control Name: Load and unload device drivers
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/LoadUnloadDeviceDrivers
CSP Value Type: String
Warning Domain Controller = "ContainsAtMost('*S-1-5-32-544', '*S-1-5-32-550')"
Member Server = "ContainsAtMost('*S-1-5-32-544')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544')"
UserRightsLockMemory
(CCE-36495-0)
Control Name: Lock pages in memory
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/LockMemory
CSP Value Type: String
Warning Domain Controller = "Equals('')"
Member Server = "Equals('')"
Workgroup Member = "Equals('')"
UserRightsManageAuditingAndSecurityLog
(CCE-35906-7)
Control Name: Manage auditing and security log
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ManageAuditingAndSecurityLog
CSP Value Type: String
Critical Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
UserRightsManageVolume
(CCE-36143-6)
Control Name: Perform volume maintenance tasks
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ManageVolume
CSP Value Type: String
Warning Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
UserRightsModifyFirmwareEnvironment
(CCE-38113-7)
Control Name: Modify firmware environment values
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ModifyFirmwareEnvironment
CSP Value Type: String
Warning Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
UserRightsModifyObjectLabel
(CCE-36054-5)
Control Name: Modify an object label
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ModifyObjectLabel
CSP Value Type: String
Warning Domain Controller = "Equals('')"
Member Server = "Equals('')"
Workgroup Member = "Equals('')"
UserRightsProfileSingleProcess
(CCE-37131-0)
Control Name: Profile single process
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ProfileSingleProcess
CSP Value Type: String
Warning Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
UserRightsProfileSystemPerformance
(CCE-36052-9)
Control Name: Profile system performance
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ProfileSystemPerformance
CSP Value Type: String
Warning Domain Controller = "ContainsAtMost('*S-1-5-32-544',
'*S-1-5-80-3139157870-2983391045-3678747466-658725712-1809340420')"
Member Server = "ContainsAtMost('*S-1-5-32-544',
'*S-1-5-80-3139157870-2983391045-3678747466-658725712-1809340420')"
Workgroup Member = "ContainsAtMost('*S-1-5-32-544',
'*S-1-5-80-3139157870-2983391045-3678747466-658725712-1809340420')"
UserRightsRemoteShutdown
(CCE-37877-8)
Control Name: Force shutdown from a remote system
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/RemoteShutdown
CSP Value Type: String
Critical Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
UserRightsReplaceProcessLevelToken
(CCE-37430-6)
Control Name: Replace a process level token
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ReplaceProcessLevelToken
CSP Value Type: String
Warning Domain Controller = "ContainsAtMost('*S-1-5-19', '*S-1-5-20')"
Member Server = "ContainsAtMost('*S-1-5-19', '*S-1-5-20')"
Workgroup Member = "ContainsAtMost('*S-1-5-19', '*S-1-5-20')"
UserRightsRestoreFilesAndDirectories
(CCE-37613-7)
Control Name: Restore files and directories
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/RestoreFilesAndDirectories
CSP Value Type: String
Warning Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
UserRightsShutDownTheSystem
(CCE-38328-1)
Control Name: Shut down the system
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/ShutDownTheSystem
CSP Value Type: String
Warning Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
UserRightsTakeOwnership
(CCE-38325-7)
Control Name: Take ownership of files or other objects
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/UserRights/TakeOwnership
CSP Value Type: String
Critical Domain Controller = "ContainsExactly('*S-1-5-32-544')"
Member Server = "ContainsExactly('*S-1-5-32-544')"
Workgroup Member = "ContainsExactly('*S-1-5-32-544')"
VirtualizeFileAndRegistryWriteFailuresToPerUserLocations
(CCE-37064-3)
Control Name: User Account Control: Virtualize file and registry write failures to per-user locations
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: EnableVirtualization
Registry Value Type: REG_DWORD
CSP Name: ./Vendor/MSFT/Policy
CSP Path: Config/LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations
CSP Value Type: Integer
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
WindowsExplorerShellProtocolProtectedModeTitle_2
(CCE-36809-2)
Control Name: Turn off shell protocol protected mode
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Registry Value: PreXPSP2ShellProtocolBehavior
Registry Value Type: REG_DWORD
Warning Domain Controller = "OneOf(Equals(0), Equals(null))"
Member Server = "OneOf(Equals(0), Equals(null))"
Workgroup Member = "OneOf(Equals(0), Equals(null))"
WindowsHelloAntiSpoofing Control Name: Configure enhanced anti-spoofing
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Biometrics\FacialFeatures
Registry Value: EnhancedAntiSpoofing
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
WindowsLogonAllowAutomaticRestartSignOn
(CCE-36977-7)
Control Name: Sign-in last interactive user automatically after a system-initiated restart
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: DisableAutomaticRestartSignOn
Registry Value Type: REG_DWORD
Critical Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
WindowsLogonConfigAutomaticRestartSignOn Control Name: Sign-in and lock last interactive user automatically after a restart
Registry Key: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Registry Value: AutomaticRestartSignOnConfig
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
WindowsLogonDisableLockScreenAppNotifications
(CCE-35893-7)
Control Name: Turn off app notifications on the lock screen
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
Registry Value: DisableLockScreenAppNotifications
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
WindowsLogonDontDisplayNetworkSelectionUI
(CCE-38353-9)
Control Name: Do not display network selection UI
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
Registry Value: DontDisplayNetworkSelectionUI
Registry Value Type: REG_DWORD
Warning Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
WindowsLogonEnumerateLocalUsersOnDomainJoinedComputers
(AZ-WIN-202204)
Control Name: Enumerate local users on domain-joined computers
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
Registry Value: EnumerateLocalUsers
Registry Value Type: REG_DWORD
Warning Member Server = "Equals(0)"
WindowsPowerShellTurnOnPowerShellScriptBlockLogging
(AZ-WIN-73591)
Control Name: Turn on PowerShell Script Block Logging
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging
Registry Value: EnableScriptBlockLogging
Registry Value Type: REG_DWORD
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
WinVerityTrustSignatureValidationVulnerabilityMitigation1
(AZ-WIN-202401)
Control Name: WinVerifyTrust Signature Validation vulnerability Mitigation 1
Registry Key: HKLM:\SOFTWARE\Microsoft\Cryptography\Wintrust\Config
Registry Value: EnableCertPaddingCheck
Registry Value Type: REG_SZ
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
WinVerityTrustSignatureValidationVulnerabilityMitigation2
(AZ-WIN-202402)
Control Name: WinVerifyTrust Signature Validation vulnerability Mitigation 2
Registry Key: HKLM:\SOFTWARE\Wow6432Node\Microsoft\Cryptography\Wintrust\Config
Registry Value: EnableCertPaddingCheck
Registry Value Type: REG_SZ
Important Domain Controller = "Equals(1)"
Member Server = "Equals(1)"
Workgroup Member = "Equals(1)"
AllowDatagramProcessingOnWinServer Control Name: This setting controls datagram processing for Network Protection is enabled on Server
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\NIS\Consumers\IPS
Registry Value: AllowDatagramProcessingOnWinServer
Registry Value Type: REG_DWORD
Important Equals(0)
AllowNetworkProtectionOnWinServer Control Name: This setting controls whether Network Protection is allows to be configured into block or Audit mode on Windows Server
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\Network Protection
Registry Value: AllowNetworkProtectionOnWinServer
Registry Value Type: REG_DWORD
Important Equals(1)
ASRBlockAbuseOfExploitedVulnerableSignedDrivers Control Name: Block abuse of exploited vulnerable signed drivers
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: 56a863a9-875e-4185-98a7-b882c64b5ce5
Registry Value Type: REG_DWORD
Critical Equals(1)
ASRBlockAdobeReaderFromCreatingChildProcesses Control Name: Block Adobe Reader from creating child processes
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
Registry Value Type: REG_DWORD
Informational Equals(0)
ASRBlockEXEFromEmailClientAndWebmail Control Name: Block executable content from email client and webmail
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: be9ba2d9-53ea-4cdc-84e5-9b1eeee46550
Registry Value Type: REG_DWORD
Informational Equals(0)
ASRBlockEXEFromRunningUnlessTrusted Control Name: Block executable files from running unless they meet a prevalence, age, or trusted list criterion
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: 01443614-cd74-433a-b99e-2ecdc07bfc25
Registry Value Type: REG_DWORD
Critical Equals(1)
ASRBlockJSVBSLaunchingDownloadedContent Control Name: Block JavaScript or VBScript from launching downloaded executable content
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: d3e037e1-3eb8-44c8-a917-57927947596d
Registry Value Type: REG_DWORD
Critical Equals(1)
ASRBlockLSASSCredentialStealing Control Name: Block credential stealing from the Windows local security authority subsystem (lsass.exe)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
Registry Value Type: REG_DWORD
Critical Equals(1)
ASRBlockOfficeApplicationsFromCreatingChildProcesses Control Name: Block all Office applications from creating child processes
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: d4f940ab-401b-4efc-aadc-ad5f3c50688a
Registry Value Type: REG_DWORD
Informational Equals(0)
ASRBlockOfficeCommunicationApplicationFromCreatingChildProcesses Control Name: Block Office communication application from creating child processes
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: 26190899-1602-49e8-8b27-eb1d0a1ce869
Registry Value Type: REG_DWORD
Informational Equals(0)
ASRBlockOfficeFromCreatingExecutableContent Control Name: Block Office applications from creating executable content
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: 3b576869-a4ec-4529-8536-b80a7769e899
Registry Value Type: REG_DWORD
Informational Equals(0)
ASRBlockOfficeFromInjectingCodeIntoProcesses Control Name: Block Office applications from injecting code into other processes
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84
Registry Value Type: REG_DWORD
Informational Equals(0)
ASRBlockPersistenceThroughWMIEventSubscription Control Name: Block persistence through WMI event subscription (File and folder exclusions not supported)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: e6db77e5-3df2-4cf1-b95a-636979351e5b
Registry Value Type: REG_DWORD
Important Equals(2)
ASRBlockPotentiallyObfuscatedScripts Control Name: Block execution of potentially obfuscated scripts
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: 5beb7efe-fd9a-4556-801d-275e5ffc04cc
Registry Value Type: REG_DWORD
Critical Equals(1)
ASRBlockProcessCreationFromPSExecAndWMICommands Control Name: Block process creations originating from PSExec and WMI commands
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: d1e49aac-8f56-4280-b9ba-993a6d77406c
Registry Value Type: REG_DWORD
Important Equals(2)
ASRBlockRebootingMachineInSafeMode Control Name: Block rebooting machine in Safe Mode (preview)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: 33ddedf1-c6e0-47cb-833e-de6133960387
Registry Value Type: REG_DWORD
Important Equals(2)
ASRBlockUntrustedAndUnsignedProcessesRunningFromUSB Control Name: Block untrusted and unsigned processes that run from USB
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
Registry Value Type: REG_DWORD
Critical Equals(1)
ASRBlockUseOfCopiedOrImpersonatedSystemTools Control Name: Block use of copied or impersonated system tools (preview)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb
Registry Value Type: REG_DWORD
Important Equals(2)
ASRBlockWebshellCreationForServers Control Name: Block Webshell creation for Servers
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: a8f5898e-1dc8-49a9-9878-85004b8a61e6
Registry Value Type: REG_DWORD
Critical Equals(1)
ASRBlockWIN32APIFromOfficeMacros Control Name: Block Win32 API calls from Office macros
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b
Registry Value Type: REG_DWORD
Informational Equals(0)
ASRUseAdvancedProtectionAgainstRansomware Control Name: Use advanced protection against ransomware
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Registry Value: c1db55ab-c21a-4637-bb3f-a12568109d35
Registry Value Type: REG_DWORD
Critical Equals(1)
AttackSurfaceReductionRules
(AZ-WIN-202205)
Control Name: Configure Attack Surface Reduction rules
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR
Registry Value: ExploitGuard_ASR_Rules
Registry Value Type: REG_DWORD
Critical Equals(1)
DisableAntiSpyware Control Name: Turn off Microsoft Defender AntiVirus
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender
Registry Value: DisableAntiSpyware
Registry Value Type: REG_DWORD
Critical Equals(0)
DisableAutoExclusions Control Name: Turn off Auto Exclusions
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions
Registry Value: DisableAutoExclusions
Registry Value Type: REG_DWORD
Critical Equals(0)
DisableBehaviorMonitoring Control Name: Turn on behavior monitoring
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
Registry Value: DisableBehaviorMonitoring
Registry Value Type: REG_DWORD
Critical Equals(0)
DisableBlockAtFirstSeen Control Name: Configure the 'Block at First Sight' feature
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
Registry Value: DisableBlockAtFirstSeen
Registry Value Type: REG_DWORD
Critical Equals(0)
DisableEmailScanning Control Name: Turn on e-mail scanning
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Scan
Registry Value: DisableEmailScanning
Registry Value Type: REG_DWORD
Critical Equals(0)
DisableIOAVProtection Control Name: Scan all downloaded files and attachments
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
Registry Value: DisableIOAVProtection
Registry Value Type: REG_DWORD
Critical Equals(0)
DisableRealtimeMonitoring Control Name: Turn off real-time protection
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
Registry Value: DisableRealtimeMonitoring
Registry Value Type: REG_DWORD
Critical Equals(0)
DisableRemovableDriveScanning Control Name: Scan removable drives
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Scan
Registry Value: DisableRemovableDriveScanning
Registry Value Type: REG_DWORD
Critical Equals(0)
DisableRoutinelyTakingAction Control Name: Turn off routine remediation
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender
Registry Value: DisableRoutinelyTakingAction
Registry Value Type: REG_DWORD
Critical Equals(0)
DisableScanOnUpdate Control Name: Turn on scan after security intelligence update
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates
Registry Value: DisableScanOnUpdate
Registry Value Type: REG_DWORD
Critical Equals(0)
DisableScriptScanning Control Name: Turn on script scanning
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
Registry Value: DisableScriptScanning
Registry Value Type: REG_DWORD
Critical Equals(0)
DisallowExploitProtectionOverride Control Name: Prevent users from modifying settings
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\App and Browser protection
Registry Value: DisallowExploitProtectionOverride
Registry Value Type: REG_DWORD
Critical Equals(1)
EnableConvertWarnToBlock Control Name: Convert warn verdict to block
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\NIS
Registry Value: EnableConvertWarnToBlock
Registry Value Type: REG_DWORD
Important Equals(0)
EngineRing Control Name: Select the channel for Microsoft Defender monthly engine updates
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender
Registry Value: EngineRing
Registry Value Type: REG_DWORD
Critical OneOf(Equals(5),Equals(6))
HideExclusionsFromLocalAdmins Control Name: Control whether or not exclusions are visible to Local Admins
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender
Registry Value: HideExclusionsFromLocalAdmins
Registry Value Type: REG_DWORD
Important Equals(1)
HideExclusionsFromLocalUsers Control Name: Control whether exclusions are visible to local users
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender
Registry Value: HideExclusionsFromLocalUsers
Registry Value Type: REG_DWORD
Critical Equals(1)
LocalSettingOverrideSpynetReporting Control Name: Configure local setting override for reporting to Microsoft MAPS
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
Registry Value: LocalSettingOverrideSpynetReporting
Registry Value Type: REG_DWORD
Important Equals(0)
MpCloudBlockLevel Control Name: Select cloud protection level
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine
Registry Value: MpCloudBlockLevel
Registry Value Type: REG_DWORD
Critical OneOf(Equals(2),Equals(4),Equals(6))
OobeEnableRtpAndSigUpdate Control Name: Configure real-time protection and Security Intelligence Updates during OOBE
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
Registry Value: OobeEnableRtpAndSigUpdate
Registry Value Type: REG_DWORD
Critical Equals(1)
PlatformRing Control Name: Select the channel for Microsoft Defender monthly platform updates
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender
Registry Value: PlatformRing
Registry Value Type: REG_DWORD
Critical OneOf(Equals(5),Equals(6))
PUAProtection Control Name: Configure detection for potentially unwanted applications
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender
Registry Value: PUAProtection
Registry Value Type: REG_DWORD
Critical Equals(2)
QuickScanIncludeExclusions Control Name: Scan excluded files and directories during quick scans
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Scan
Registry Value: QuickScanIncludeExclusions
Registry Value Type: REG_DWORD
Important Equals(1)
SchedulerRandomizationTime Control Name: Configure scheduled task times randomization window
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender
Registry Value: SchedulerRandomizationTime
Registry Value Type: REG_DWORD
Important Range(1, 4)
SignaturesRing Control Name: Select the channel for Microsoft Defender daily security intelligence updates
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender
Registry Value: SignaturesRing
Registry Value Type: REG_DWORD
Critical Equals(5)
SpynetReporting Control Name: Join Microsoft MAPS
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
Registry Value: SpynetReporting
Registry Value Type: REG_DWORD
Critical Equals(2)
SubmitSamplesConsent Control Name: Send file samples when further analysis is required
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
Registry Value: SubmitSamplesConsent
Registry Value Type: REG_DWORD
Critical OneOf(Equals(1),Equals(3))
ConfigureSystemGuardLaunch
(AZ-WIN-202247)
Control Name: Secured-Core SystemGuard (DRTM)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
Registry Value: ConfigureSystemGuardLaunch
CSP Name: ./Vendor/MSFT/Policy
CSP Path(s): Config/DeviceGuard/ConfigureSystemGuardLaunch
Data Type: Number
Critical 1
EnableVirtualizationBasedSecurity
(AZ-WIN-202245)
Control Name: Secured-Core Virtualization Based Security (VBS)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
Registry Value: EnableVirtualizationBasedSecurity
CSP Name: ./Vendor/MSFT/Policy
CSP Path(s): Config/DeviceGuard/EnableVirtualizationBasedSecurity
Data Type: Number
Critical 1
HypervisorEnforcedCodeIntegrity
(AZ-WIN-202246)
Control Name: Secured-Core Hypervisor-protected Code Integrity (HVCI)
Registry Key: HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
Registry Value: HypervisorEnforcedCodeIntegrity
CSP Name: ./Vendor/MSFT/Policy
CSP Path(s): Config/VirtualizationBasedTechnology/HypervisorEnforcedCodeIntegrity
Data Type: Number
Critical 2

Note

Availability of specific Azure Policy Machine Configuration settings may vary in Azure Government and other national clouds.

If you'd like to download this list of rules check out this link Security Basline Ruleset

Next steps

Additional articles about Azure Policy and Machine Configuration: