没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论














CIS Microsoft Windows
Server 2022 Benchmark
v2.0.0 - 04-14-2023

Page 2
Table of Contents
Terms of Use ................................................................................................................. 1
Table of Contents .......................................................................................................... 2
Overview ...................................................................................................................... 21
Intended Audience ................................................................................................................21
Consensus Guidance ...........................................................................................................22
Typographical Conventions .................................................................................................23
Recommendation Definitions ..................................................................................... 24
Title ........................................................................................................................................24
Assessment Status ...............................................................................................................24
Automated ............................................................................................................................................ 24
Manual ................................................................................................................................................... 24
Profile ....................................................................................................................................24
Description ............................................................................................................................24
Rationale Statement .............................................................................................................25
Impact Statement ..................................................................................................................25
Audit Procedure ....................................................................................................................25
Remediation Procedure ........................................................................................................25
Default Value .........................................................................................................................25
References ............................................................................................................................25
CIS Critical Security Controls
®
(CIS Controls
®
) ..................................................................25
Additional Information..........................................................................................................25
Profile Definitions .................................................................................................................26
Acknowledgements ..............................................................................................................28
Recommendations ...................................................................................................... 29
1 Account Policies ................................................................................................................29
1.1 Password Policy ............................................................................................................................ 29
1.1.1 (L1) Ensure 'Enforce password history' is set to '24 or more password(s)' (Automated) .................... 30
1.1.2 (L1) Ensure 'Maximum password age' is set to '365 or fewer days, but not 0' (Automated) ............... 32
1.1.3 (L1) Ensure 'Minimum password age' is set to '1 or more day(s)' (Automated) .................................. 34
1.1.4 (L1) Ensure 'Minimum password length' is set to '14 or more character(s)' (Automated) ................... 36
1.1.5 (L1) Ensure 'Password must meet complexity requirements' is set to 'Enabled' (Automated) ........... 39
1.1.6 (L1) Ensure 'Relax minimum password length limits' is set to 'Enabled' (Automated) ........................ 42
1.1.7 (L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled' (Automated) .............. 44
1.2 Account Lockout Policy ................................................................................................................ 46
1.2.1 (L1) Ensure 'Account lockout duration' is set to '15 or more minute(s)' (Automated) ......................... 47
1.2.2 (L1) Ensure 'Account lockout threshold' is set to '5 or fewer invalid logon attempt(s), but not 0'
(Automated) ................................................................................................................................................ 49

Page 3
1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled' (Manual) .................................. 51
1.2.4 (L1) Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)' (Automated) ........ 53
2 Local Policies .....................................................................................................................56
2.1 Audit Policy .................................................................................................................................... 56
2.2 User Rights Assignment ............................................................................................................... 56
2.2.1 (L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One' (Automated) ............ 57
2.2.2 (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users,
ENTERPRISE DOMAIN CONTROLLERS' (DC only) (Automated)............................................................. 59
2.2.3 (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users'
(MS only) (Automated) ................................................................................................................................ 61
2.2.4 (L1) Ensure 'Act as part of the operating system' is set to 'No One' (Automated) .............................. 63
2.2.5 (L1) Ensure 'Add workstations to domain' is set to 'Administrators' (DC only) (Automated) ............... 64
2.2.6 (L1) Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE,
NETWORK SERVICE' (Automated) ............................................................................................................ 66
2.2.7 (L1) Ensure 'Allow log on locally' is set to 'Administrators' (Automated) ............................................. 68
2.2.8 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only)
(Automated) ................................................................................................................................................ 70
2.2.9 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote
Desktop Users' (MS only) (Automated) ....................................................................................................... 72
2.2.10 (L1) Ensure 'Back up files and directories' is set to 'Administrators' (Automated) ............................ 74
2.2.11 (L1) Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE' (Automated) .... 76
2.2.12 (L1) Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE' (Automated) ....... 79
2.2.13 (L1) Ensure 'Create a pagefile' is set to 'Administrators' (Automated).............................................. 80
2.2.14 (L1) Ensure 'Create a token object' is set to 'No One' (Automated) ................................................. 81
2.2.15 (L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK
SERVICE, SERVICE' (Automated) ............................................................................................................. 82
2.2.16 (L1) Ensure 'Create permanent shared objects' is set to 'No One' (Automated) .............................. 84
2.2.17 (L1) Ensure 'Create symbolic links' is set to 'Administrators' (DC only) (Automated) ....................... 85
2.2.18 (L1) Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual
Machines' (MS only) (Automated) ............................................................................................................... 87
2.2.19 (L1) Ensure 'Debug programs' is set to 'Administrators' (Automated) .............................................. 89
2.2.20 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only)
(Automated) ................................................................................................................................................ 91
2.2.21 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests, Local account and
member of Administrators group' (MS only) (Automated) ........................................................................... 93
2.2.22 (L1) Ensure 'Deny log on as a batch job' to include 'Guests' (Automated) ....................................... 95
2.2.23 (L1) Ensure 'Deny log on as a service' to include 'Guests' (Automated) .......................................... 97
2.2.24 (L1) Ensure 'Deny log on locally' to include 'Guests' (Automated) ................................................... 98
2.2.25 (L1) Ensure 'Deny log on through Remote Desktop Services' to include 'Guests' (DC only)
(Automated) ................................................................................................................................................ 99
2.2.26 (L1) Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account' (MS
only) (Automated) ..................................................................................................................................... 101
2.2.27 (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to
'Administrators' (DC only) (Automated) ..................................................................................................... 103
2.2.28 (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS
only) (Automated) ..................................................................................................................................... 105
2.2.29 (L1) Ensure 'Force shutdown from a remote system' is set to 'Administrators' (Automated) .......... 107
2.2.30 (L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'
(Automated) .............................................................................................................................................. 109
2.2.31 (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE,
NETWORK SERVICE, SERVICE' (DC only) (Automated) ........................................................................ 111
2.2.32 (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE,
NETWORK SERVICE, SERVICE' and (when the Web Server (IIS) Role with Web Services Role Service is
installed) 'IIS_IUSRS' (MS only) (Automated) ........................................................................................... 113

Page 4
2.2.33 (L1) Ensure 'Increase scheduling priority' is set to 'Administrators, Window Manager\Window
Manager Group' (Automated) ................................................................................................................... 115
2.2.34 (L1) Ensure 'Load and unload device drivers' is set to 'Administrators' (Automated) ..................... 116
2.2.35 (L1) Ensure 'Lock pages in memory' is set to 'No One' (Automated) ............................................. 118
2.2.36 (L2) Ensure 'Log on as a batch job' is set to 'Administrators' (DC Only) (Automated) .................... 119
2.2.37 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is
running in the environment) 'Exchange Servers' (DC only) (Automated) .................................................. 120
2.2.38 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only) (Automated) .. 121
2.2.39 (L1) Ensure 'Modify an object label' is set to 'No One' (Automated) ............................................... 122
2.2.40 (L1) Ensure 'Modify firmware environment values' is set to 'Administrators' (Automated) .............. 123
2.2.41 (L1) Ensure 'Perform volume maintenance tasks' is set to 'Administrators' (Automated) ............... 124
2.2.42 (L1) Ensure 'Profile single process' is set to 'Administrators' (Automated) ..................................... 125
2.2.43 (L1) Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost'
(Automated) .............................................................................................................................................. 126
2.2.44 (L1) Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'
(Automated) .............................................................................................................................................. 127
2.2.45 (L1) Ensure 'Restore files and directories' is set to 'Administrators' (Automated) .......................... 129
2.2.46 (L1) Ensure 'Shut down the system' is set to 'Administrators' (Automated) .................................... 131
2.2.47 (L1) Ensure 'Synchronize directory service data' is set to 'No One' (DC only) (Automated) ........... 133
2.2.48 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators' (Automated) ......... 134
2.3 Security Options .......................................................................................................................... 136
2.3.1 Accounts ................................................................................................................................. 136
2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft
accounts' (Automated) .............................................................................................................................. 137
2.3.1.2 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only) (Automated) ............ 139
2.3.1.3 (L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to
'Enabled' (Automated) ............................................................................................................................... 141
2.3.1.4 (L1) Configure 'Accounts: Rename administrator account' (Automated) ....................................... 143
2.3.1.5 (L1) Configure 'Accounts: Rename guest account' (Automated) ................................................... 145
2.3.2 Audit ........................................................................................................................................ 147
2.3.2.1 (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override
audit policy category settings' is set to 'Enabled' (Automated) .................................................................. 148
2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to
'Disabled' (Automated) .............................................................................................................................. 150
2.3.3 DCOM ...................................................................................................................................... 152
2.3.4 Devices .................................................................................................................................... 152
2.3.4.1 (L1) Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators'
(Automated) .............................................................................................................................................. 153
2.3.4.2 (L1) Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled' (Automated)
.................................................................................................................................................................. 155
2.3.5 Domain controller................................................................................................................... 157
2.3.5.1 (L1) Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC
only) (Automated) ..................................................................................................................................... 158
2.3.5.2 (L1) Ensure 'Domain controller: Allow vulnerable Netlogon secure channel connections' is set to
'Not Configured' (DC Only) (Automated) ................................................................................................... 160
2.3.5.3 (L1) Ensure 'Domain controller: LDAP server channel binding token requirements' is set to 'Always'
(DC Only) (Automated) ............................................................................................................................. 162
2.3.5.4 (L1) Ensure 'Domain controller: LDAP server signing requirements' is set to 'Require signing' (DC
only) (Automated) ..................................................................................................................................... 165
2.3.5.5 (L1) Ensure 'Domain controller: Refuse machine account password changes' is set to 'Disabled'
(DC only) (Automated) .............................................................................................................................. 167
2.3.6 Domain member ..................................................................................................................... 169
2.3.6.1 (L1) Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to
'Enabled' (Automated) ............................................................................................................................... 170
剩余1064页未读,继续阅读
资源评论


Jacky2023
- 粉丝: 0
- 资源: 7
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


安全验证
文档复制为VIP权益,开通VIP直接复制
