DISA STIG • Operating System

Windows Server 2019

Release: 7 Benchmark Date: 05 Jan 2026 283 Rules 34 CAT I 235 CAT II 14 CAT III
Vuln ID STIG ID CAT Finding Responsibility
V-205844 WN19-00-000010 CAT I Windows Server 2019 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
V-205845 WN19-00-000030 CAT I Windows Server 2019 administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
V-205849 WN19-00-000100 CAT I Windows Server 2019 must be maintained at a supported servicing level.
V-205850 WN19-00-000110 CAT I Windows Server 2019 must use an anti-virus program.
V-205663 WN19-00-000130 CAT I Windows Server 2019 local volumes must use a format that supports NTFS attributes.
V-205727 WN19-00-000250 CAT I Windows Server 2019 systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
V-205653 WN19-AC-000090 CAT I Windows Server 2019 reversible password encryption must be disabled.
V-205804 WN19-CC-000210 CAT I Windows Server 2019 Autoplay must be turned off for non-volume devices.
V-205805 WN19-CC-000220 CAT I Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands.
V-205806 WN19-CC-000230 CAT I Windows Server 2019 AutoPlay must be disabled for all drives.
V-205802 WN19-CC-000430 CAT I Windows Server 2019 must disable the Windows Installer Always install with elevated privileges option.
V-205711 WN19-CC-000470 CAT I Windows Server 2019 Windows Remote Management (WinRM) client must not use Basic authentication.
V-205713 WN19-CC-000500 CAT I Windows Server 2019 Windows Remote Management (WinRM) service must not use Basic authentication.
V-205738 WN19-DC-000010 CAT I Windows Server 2019 must only allow administrators responsible for the domain controller to have Administrator rights on the system.
V-205739 WN19-DC-000070 CAT I Windows Server 2019 permissions on the Active Directory data files must only allow System and Administrators access.
V-205740 WN19-DC-000080 CAT I Windows Server 2019 Active Directory SYSVOL directory must have the proper access control permissions.
V-205741 WN19-DC-000090 CAT I Windows Server 2019 Active Directory Group Policy objects must have proper access control permissions.
V-205742 WN19-DC-000100 CAT I Windows Server 2019 Active Directory Domain Controllers Organizational Unit (OU) object must have the proper access control permissions.
V-205743 WN19-DC-000110 CAT I Windows Server 2019 organization created Active Directory Organizational Unit (OU) objects must have proper access control permissions.
V-205875 WN19-DC-000150 CAT I Windows Server 2019 directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
V-205646 WN19-DC-000290 CAT I Windows Server 2019 domain controller PKI certificates must be issued by the DOD PKI or an approved External Certificate Authority (ECA).
V-205647 WN19-DC-000300 CAT I Windows Server 2019 PKI certificates associated with user accounts must be issued by a DoD PKI or an approved External Certificate Authority (ECA).
V-205746 WN19-MS-000010 CAT I Windows Server 2019 must only allow Administrators responsible for the member server or standalone or nondomain-joined system to have Administrator rights on the system.
V-205907 WN19-MS-000140 CAT I Windows Server 2019 must be running Credential Guard on domain-joined member servers.
V-205908 WN19-SO-000020 CAT I Windows Server 2019 must prevent local accounts with blank passwords from being used from the network.
V-205913 WN19-SO-000210 CAT I Windows Server 2019 must not allow anonymous SID/Name translation.
V-205914 WN19-SO-000220 CAT I Windows Server 2019 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.
V-205724 WN19-SO-000230 CAT I Windows Server 2019 must not allow anonymous enumeration of shares.
V-205725 WN19-SO-000250 CAT I Windows Server 2019 must restrict anonymous access to Named Pipes and Shares.
V-205654 WN19-SO-000300 CAT I Windows Server 2019 must be configured to prevent the storage of the LAN Manager hash of passwords.
V-205919 WN19-SO-000310 CAT I Windows Server 2019 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM.
V-205750 WN19-UR-000020 CAT I Windows Server 2019 Act as part of the operating system user right must not be assigned to any groups or accounts.
V-205753 WN19-UR-000060 CAT I Windows Server 2019 Create a token object user right must not be assigned to any groups or accounts.
V-205757 WN19-UR-000100 CAT I Windows Server 2019 Debug programs: user right must only be assigned to the Administrators group.
V-205657 WN19-00-000020 CAT II Windows Server 2019 passwords for the built-in Administrator account must be changed at least every 60 days.
V-205846 WN19-00-000040 CAT II Windows Server 2019 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
V-205661 WN19-00-000050 CAT II Windows Server 2019 manually managed application account passwords must be at least 14 characters in length.
V-205847 WN19-00-000060 CAT II Windows Server 2019 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
V-205699 WN19-00-000070 CAT II Windows Server 2019 shared user accounts must not be permitted.
V-205807 WN19-00-000080 CAT II Windows Server 2019 must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
V-205848 WN19-00-000090 CAT II Windows Server 2019 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
V-205851 WN19-00-000120 CAT II Windows Server 2019 must have a host-based intrusion detection or prevention system.
V-205734 WN19-00-000140 CAT II Windows Server 2019 permissions for the system drive root directory (usually C:\) must conform to minimum requirements.
V-205735 WN19-00-000150 CAT II Windows Server 2019 permissions for program file directories must conform to minimum requirements.
V-205736 WN19-00-000160 CAT II Windows Server 2019 permissions for the Windows installation directory must conform to minimum requirements.
V-205737 WN19-00-000170 CAT II Windows Server 2019 default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained.
V-205707 WN19-00-000190 CAT II Windows Server 2019 outdated or unused accounts must be removed or disabled.
V-205700 WN19-00-000200 CAT II Windows Server 2019 accounts must require passwords.
V-205658 WN19-00-000210 CAT II Windows Server 2019 passwords must be configured to expire.
V-205803 WN19-00-000220 CAT II Windows Server 2019 system files must be monitored for unauthorized changes.
V-205721 WN19-00-000230 CAT II Windows Server 2019 non-system-created file shares must limit access to groups that require it.
V-205852 WN19-00-000240 CAT II Windows Server 2019 must have software certificate installation files removed.
V-205829 WN19-00-000260 CAT II Windows Server 2019 must implement protection methods such as TLS, encrypted VPNs, or IPsec if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
V-205677 WN19-00-000270 CAT II Windows Server 2019 must have the roles and features required by the system documented.
V-214936 WN19-00-000280 CAT II Windows Server 2019 must have a host-based firewall installed and enabled.
V-205728 WN19-00-000290 CAT II Windows Server 2019 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where Endpoint Security Solution (ESS) is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
V-205624 WN19-00-000300 CAT II Windows Server 2019 must automatically remove or disable temporary user accounts after 72 hours.
V-205710 WN19-00-000310 CAT II Windows Server 2019 must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.
V-205678 WN19-00-000320 CAT II Windows Server 2019 must not have the Fax Server role installed.
V-205697 WN19-00-000330 CAT II Windows Server 2019 must not have the Microsoft FTP service installed unless required by the organization.
V-205679 WN19-00-000340 CAT II Windows Server 2019 must not have the Peer Name Resolution Protocol installed.
V-205680 WN19-00-000350 CAT II Windows Server 2019 must not have Simple TCP/IP Services installed.
V-205698 WN19-00-000360 CAT II Windows Server 2019 must not have the Telnet Client installed.
V-205681 WN19-00-000370 CAT II Windows Server 2019 must not have the TFTP Client installed.
V-205682 WN19-00-000380 CAT II Windows Server 2019 must not have the Server Message Block (SMB) v1 protocol installed.
V-205683 WN19-00-000390 CAT II Windows Server 2019 must have the Server Message Block (SMB) v1 protocol disabled on the SMB server.
V-205684 WN19-00-000400 CAT II Windows Server 2019 must have the Server Message Block (SMB) v1 protocol disabled on the SMB client.
V-205685 WN19-00-000410 CAT II Windows Server 2019 must not have Windows PowerShell 2.0 installed.
V-205853 WN19-00-000420 CAT II Windows Server 2019 FTP servers must be configured to prevent anonymous logons.
V-205854 WN19-00-000430 CAT II Windows Server 2019 FTP servers must be configured to prevent access to the system drive.
V-205855 WN19-00-000450 CAT II Windows Server 2019 must have orphaned security identifiers (SIDs) removed from user rights.
V-205795 WN19-AC-000010 CAT II Windows Server 2019 account lockout duration must be configured to 15 minutes or greater.
V-205629 WN19-AC-000020 CAT II Windows Server 2019 must have the number of allowed bad logon attempts configured to three or less.
V-205630 WN19-AC-000030 CAT II Windows Server 2019 must have the period of time before the bad logon counter is reset configured to 15 minutes or greater.
V-205660 WN19-AC-000040 CAT II Windows Server 2019 password history must be configured to 24 passwords remembered.
V-205659 WN19-AC-000050 CAT II Windows Server 2019 maximum password age must be configured to 60 days or less.
V-205656 WN19-AC-000060 CAT II Windows Server 2019 minimum password age must be configured to at least one day.
V-205662 WN19-AC-000070 CAT II Windows Server 2019 minimum password length must be configured to 14 characters.
V-205652 WN19-AC-000080 CAT II Windows Server 2019 must have the built-in Windows password complexity policy enabled.
V-205799 WN19-AU-000010 CAT II Windows Server 2019 audit records must be backed up to a different system or media than the system being audited.
V-205843 WN19-AU-000020 CAT II Windows Server 2019 must, at a minimum, offload audit records of interconnected systems in real time and offload standalone or nondomain-joined systems weekly.
V-205640 WN19-AU-000030 CAT II Windows Server 2019 permissions for the Application event log must prevent access by non-privileged accounts.
V-205641 WN19-AU-000040 CAT II Windows Server 2019 permissions for the Security event log must prevent access by non-privileged accounts.
V-205642 WN19-AU-000050 CAT II Windows Server 2019 permissions for the System event log must prevent access by non-privileged accounts.
V-205731 WN19-AU-000060 CAT II Windows Server 2019 Event Viewer must be protected from unauthorized modification and deletion.
V-205832 WN19-AU-000070 CAT II Windows Server 2019 must be configured to audit Account Logon - Credential Validation successes.
V-205833 WN19-AU-000080 CAT II Windows Server 2019 must be configured to audit Account Logon - Credential Validation failures.
V-205769 WN19-AU-000090 CAT II Windows Server 2019 must be configured to audit Account Management - Other Account Management Events successes.
V-205625 WN19-AU-000100 CAT II Windows Server 2019 must be configured to audit Account Management - Security Group Management successes.
V-205626 WN19-AU-000110 CAT II Windows Server 2019 must be configured to audit Account Management - User Account Management successes.
V-205627 WN19-AU-000120 CAT II Windows Server 2019 must be configured to audit Account Management - User Account Management failures.
V-205839 WN19-AU-000130 CAT II Windows Server 2019 must be configured to audit Detailed Tracking - Plug and Play Events successes.
V-205770 WN19-AU-000140 CAT II Windows Server 2019 must be configured to audit Detailed Tracking - Process Creation successes.
V-205730 WN19-AU-000160 CAT II Windows Server 2019 must be configured to audit Logon/Logoff - Account Lockout failures.
V-205834 WN19-AU-000170 CAT II Windows Server 2019 must be configured to audit Logon/Logoff - Group Membership successes.
V-205838 WN19-AU-000180 CAT II Windows Server 2019 must be configured to audit logoff successes.
V-205634 WN19-AU-000190 CAT II Windows Server 2019 must be configured to audit logon successes.
V-205635 WN19-AU-000200 CAT II Windows Server 2019 must be configured to audit logon failures.
V-205835 WN19-AU-000210 CAT II Windows Server 2019 must be configured to audit Logon/Logoff - Special Logon successes.
V-205836 WN19-AU-000220 CAT II Windows Server 2019 must be configured to audit Object Access - Other Object Access Events successes.
V-205837 WN19-AU-000230 CAT II Windows Server 2019 must be configured to audit Object Access - Other Object Access Events failures.
V-205840 WN19-AU-000240 CAT II Windows Server 2019 must be configured to audit Object Access - Removable Storage successes.
V-205841 WN19-AU-000250 CAT II Windows Server 2019 must be configured to audit Object Access - Removable Storage failures.
V-205771 WN19-AU-000260 CAT II Windows Server 2019 must be configured to audit Policy Change - Audit Policy Change successes.
V-205772 WN19-AU-000270 CAT II Windows Server 2019 must be configured to audit Policy Change - Audit Policy Change failures.
V-205773 WN19-AU-000280 CAT II Windows Server 2019 must be configured to audit Policy Change - Authentication Policy Change successes.
V-205774 WN19-AU-000290 CAT II Windows Server 2019 must be configured to audit Policy Change - Authorization Policy Change successes.
V-205775 WN19-AU-000300 CAT II Windows Server 2019 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
V-205776 WN19-AU-000310 CAT II Windows Server 2019 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
V-205777 WN19-AU-000320 CAT II Windows Server 2019 must be configured to audit System - IPsec Driver successes.
V-205778 WN19-AU-000330 CAT II Windows Server 2019 must be configured to audit System - IPsec Driver failures.
V-205779 WN19-AU-000340 CAT II Windows Server 2019 must be configured to audit System - Other System Events successes.
V-205780 WN19-AU-000350 CAT II Windows Server 2019 must be configured to audit System - Other System Events failures.
V-205781 WN19-AU-000360 CAT II Windows Server 2019 must be configured to audit System - Security State Change successes.
V-205782 WN19-AU-000370 CAT II Windows Server 2019 must be configured to audit System - Security System Extension successes.
V-205783 WN19-AU-000380 CAT II Windows Server 2019 must be configured to audit System - System Integrity successes.
V-205784 WN19-AU-000390 CAT II Windows Server 2019 must be configured to audit System - System Integrity failures.
V-278934 WN19-AU-000581 CAT II Windows Server 2019 must be configured to audit file system failures.
V-278935 WN19-AU-000582 CAT II Windows Server 2019 must be configured to audit file system successes.
V-278936 WN19-AU-000583 CAT II Windows Server 2019 must be configured to audit handle manipulation failures.
V-278937 WN19-AU-000584 CAT II Windows Server 2019 must be configured to audit handle manipulation successes.
V-278938 WN19-AU-000585 CAT II Windows Server 2019 must be configured to audit registry failures.
V-278939 WN19-AU-000586 CAT II Windows Server 2019 must be configured to audit registry successes.
V-278940 WN19-AU-000587 CAT II Windows Server 2019 must be configured to audit sensitive privilege use successes.
V-278941 WN19-AU-000588 CAT II Windows Server 2019 must be configured to audit sensitive privilege use failures.
V-205686 WN19-CC-000010 CAT II Windows Server 2019 must prevent the display of slide shows on the lock screen.
V-205687 WN19-CC-000020 CAT II Windows Server 2019 must have WDigest Authentication disabled.
V-205861 WN19-CC-000070 CAT II Windows Server 2019 insecure logons to an SMB server must be disabled.
V-205862 WN19-CC-000080 CAT II Windows Server 2019 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
V-205638 WN19-CC-000090 CAT II Windows Server 2019 command line data must be included in process creation events.
V-205863 WN19-CC-000100 CAT II Windows Server 2019 must be configured to enable Remote host allows delegation of non-exportable credentials.
V-205864 WN19-CC-000110 CAT II Windows Server 2019 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
V-205865 WN19-CC-000130 CAT II Windows Server 2019 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
V-205866 WN19-CC-000140 CAT II Windows Server 2019 group policy objects must be reprocessed even if they have not changed.
V-205688 WN19-CC-000150 CAT II Windows Server 2019 downloading print driver packages over HTTP must be turned off.
V-205689 WN19-CC-000160 CAT II Windows Server 2019 printing over HTTP must be turned off.
V-205690 WN19-CC-000170 CAT II Windows Server 2019 network selection user interface (UI) must not be displayed on the logon screen.
V-205867 WN19-CC-000180 CAT II Windows Server 2019 users must be prompted to authenticate when the system wakes from sleep (on battery).
V-205868 WN19-CC-000190 CAT II Windows Server 2019 users must be prompted to authenticate when the system wakes from sleep (plugged in).
V-205714 WN19-CC-000240 CAT II Windows Server 2019 administrator accounts must not be enumerated during elevation.
V-205869 WN19-CC-000250 CAT II Windows Server 2019 Telemetry must be configured to Security or Basic.
V-205796 WN19-CC-000270 CAT II Windows Server 2019 Application event log size must be configured to 32768 KB or greater.
V-205797 WN19-CC-000280 CAT II Windows Server 2019 Security event log size must be configured to 196608 KB or greater.
V-205798 WN19-CC-000290 CAT II Windows Server 2019 System event log size must be configured to 32768 KB or greater.
V-205692 WN19-CC-000300 CAT II Windows Server 2019 Windows Defender SmartScreen must be enabled.
V-205830 WN19-CC-000310 CAT II Windows Server 2019 Explorer Data Execution Prevention must be enabled.
V-205872 WN19-CC-000330 CAT II Windows Server 2019 File Explorer shell protocol must run in protected mode.
V-205808 WN19-CC-000340 CAT II Windows Server 2019 must not save passwords in the Remote Desktop Client.
V-205722 WN19-CC-000350 CAT II Windows Server 2019 Remote Desktop Services must prevent drive redirection.
V-205809 WN19-CC-000360 CAT II Windows Server 2019 Remote Desktop Services must always prompt a client for passwords upon connection.
V-205636 WN19-CC-000370 CAT II Windows Server 2019 Remote Desktop Services must require secure Remote Procedure Call (RPC) communications.
V-205637 WN19-CC-000380 CAT II Windows Server 2019 Remote Desktop Services must be configured with the client connection encryption set to High Level.
V-205873 WN19-CC-000390 CAT II Windows Server 2019 must prevent attachments from being downloaded from RSS feeds.
V-205693 WN19-CC-000400 CAT II Windows Server 2019 must disable Basic authentication for RSS feeds over HTTP.
V-205694 WN19-CC-000410 CAT II Windows Server 2019 must prevent Indexing of encrypted files.
V-205801 WN19-CC-000420 CAT II Windows Server 2019 must prevent users from changing installation options.
V-205874 WN19-CC-000440 CAT II Windows Server 2019 users must be notified if a web-based program attempts to install software.
V-205925 WN19-CC-000450 CAT II Windows Server 2019 must disable automatically signing in the last interactive user after a system-initiated restart.
V-205639 WN19-CC-000460 CAT II Windows Server 2019 PowerShell script block logging must be enabled.
V-205816 WN19-CC-000480 CAT II Windows Server 2019 Windows Remote Management (WinRM) client must not allow unencrypted traffic.
V-205712 WN19-CC-000490 CAT II Windows Server 2019 Windows Remote Management (WinRM) client must not use Digest authentication.
V-205817 WN19-CC-000510 CAT II Windows Server 2019 Windows Remote Management (WinRM) service must not allow unencrypted traffic.
V-205810 WN19-CC-000520 CAT II Windows Server 2019 Windows Remote Management (WinRM) service must not store RunAs credentials.
V-257503 WN19-CC-000530 CAT II Windows Server 2019 must have PowerShell Transcription enabled.
V-205702 WN19-DC-000020 CAT II Windows Server 2019 Kerberos user logon restrictions must be enforced.
V-205703 WN19-DC-000030 CAT II Windows Server 2019 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.
V-205704 WN19-DC-000040 CAT II Windows Server 2019 Kerberos user ticket lifetime must be limited to 10 hours or less.
V-205705 WN19-DC-000050 CAT II Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.
V-205706 WN19-DC-000060 CAT II Windows Server 2019 computer clock synchronization tolerance must be limited to five minutes or less.
V-205723 WN19-DC-000120 CAT II Windows Server 2019 data files owned by users must be on a different logical partition from the directory server data files.
V-205695 WN19-DC-000130 CAT II Windows Server 2019 domain controllers must run on a machine dedicated to that function.
V-205818 WN19-DC-000140 CAT II Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
V-205785 WN19-DC-000170 CAT II Windows Server 2019 Active Directory Group Policy objects must be configured with proper audit settings.
V-205786 WN19-DC-000180 CAT II Windows Server 2019 Active Directory Domain object must be configured with proper audit settings.
V-205787 WN19-DC-000190 CAT II Windows Server 2019 Active Directory Infrastructure object must be configured with proper audit settings.
V-205788 WN19-DC-000200 CAT II Windows Server 2019 Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
V-205789 WN19-DC-000210 CAT II Windows Server 2019 Active Directory AdminSDHolder object must be configured with proper audit settings.
V-205790 WN19-DC-000220 CAT II Windows Server 2019 Active Directory RID Manager$ object must be configured with proper audit settings.
V-205628 WN19-DC-000230 CAT II Windows Server 2019 must be configured to audit Account Management - Computer Account Management successes.
V-205791 WN19-DC-000240 CAT II Windows Server 2019 must be configured to audit DS Access - Directory Service Access successes.
V-205792 WN19-DC-000250 CAT II Windows Server 2019 must be configured to audit DS Access - Directory Service Access failures.
V-205793 WN19-DC-000260 CAT II Windows Server 2019 must be configured to audit DS Access - Directory Service Changes successes.
V-205645 WN19-DC-000280 CAT II Windows Server 2019 domain controllers must have a PKI server certificate.
V-205701 WN19-DC-000310 CAT II Windows Server 2019 Active Directory user accounts, including administrators, must be configured to require the use of a Common Access Card (CAC), Personal Identity Verification (PIV)-compliant hardware token, or Alternate Logon Token (ALT) for user authentication.
V-205820 WN19-DC-000320 CAT II Windows Server 2019 domain controllers must require LDAP access signing.
V-205876 WN19-DC-000330 CAT II Windows Server 2019 domain controllers must be configured to allow reset of machine account passwords.
V-205665 WN19-DC-000340 CAT II Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
V-205744 WN19-DC-000350 CAT II Windows Server 2019 Add workstations to domain user right must only be assigned to the Administrators group on domain controllers.
V-205666 WN19-DC-000360 CAT II Windows Server 2019 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
V-205667 WN19-DC-000370 CAT II Windows Server 2019 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
V-205668 WN19-DC-000380 CAT II Windows Server 2019 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
V-205669 WN19-DC-000390 CAT II Windows Server 2019 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
V-271428 WN19-DC-000391 CAT II Windows Server 2019 must be configured for certificate-based authentication for domain controllers.
V-205670 WN19-DC-000400 CAT II Windows Server 2019 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
V-271429 WN19-DC-000401 CAT II Windows Server 2019 must be configured for named-based strong mappings for certificates.
V-205732 WN19-DC-000410 CAT II Windows Server 2019 Deny log on through Remote Desktop Services user right on domain controllers must be configured to prevent unauthenticated access.
V-205745 WN19-DC-000420 CAT II Windows Server 2019 Enable computer and user accounts to be trusted for delegation user right must only be assigned to the Administrators group on domain controllers.
V-205877 WN19-DC-000430 CAT II The password for the krbtgt account on a domain must be reset at least every 180 days.
V-205715 WN19-MS-000020 CAT II Windows Server 2019 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.
V-205696 WN19-MS-000030 CAT II Windows Server 2019 local users on domain-joined member servers must not be enumerated.
V-205814 WN19-MS-000040 CAT II Windows Server 2019 must restrict unauthenticated Remote Procedure Call (RPC) clients from connecting to the RPC server on domain-joined member servers and standalone or nondomain-joined systems.
V-205906 WN19-MS-000050 CAT II Windows Server 2019 must limit the caching of logon credentials to four or less on domain-joined member servers.
V-205747 WN19-MS-000060 CAT II Windows Server 2019 must restrict remote calls to the Security Account Manager (SAM) to Administrators on domain-joined member servers and standalone or nondomain-joined systems.
V-205671 WN19-MS-000070 CAT II Windows Server 2019 "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
V-205672 WN19-MS-000080 CAT II Windows Server 2019 "Deny access to this computer from the network" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
V-205673 WN19-MS-000090 CAT II Windows Server 2019 "Deny log on as a batch job" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
V-205674 WN19-MS-000100 CAT II Windows Server 2019 "Deny log on as a service" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
V-205675 WN19-MS-000110 CAT II Windows Server 2019 "Deny log on locally" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
V-205733 WN19-MS-000120 CAT II Windows Server 2019 "Deny log on through Remote Desktop Services" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and all local accounts and from unauthenticated access on all systems.
V-205748 WN19-MS-000130 CAT II Windows Server 2019 "Enable computer and user accounts to be trusted for delegation" user right must not be assigned to any groups or accounts on domain-joined member servers and standalone or nondomain-joined systems.
V-205648 WN19-PK-000010 CAT II Windows Server 2019 must have the DoD Root Certificate Authority (CA) certificates installed in the Trusted Root Store.
V-205649 WN19-PK-000020 CAT II Windows Server 2019 must have the DoD Interoperability Root Certificate Authority (CA) cross-certificates installed in the Untrusted Certificates Store on unclassified systems.
V-205650 WN19-PK-000030 CAT II Windows Server 2019 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems.
V-205709 WN19-SO-000010 CAT II Windows Server 2019 must have the built-in guest account disabled.
V-205909 WN19-SO-000030 CAT II Windows Server 2019 built-in administrator account must be renamed.
V-205910 WN19-SO-000040 CAT II Windows Server 2019 built-in guest account must be renamed.
V-205644 WN19-SO-000050 CAT II Windows Server 2019 must force audit policy subcategory settings to override audit policy category settings.
V-205821 WN19-SO-000060 CAT II Windows Server 2019 setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
V-205822 WN19-SO-000070 CAT II Windows Server 2019 setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.
V-205823 WN19-SO-000080 CAT II Windows Server 2019 setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
V-205815 WN19-SO-000090 CAT II Windows Server 2019 computer account password must not be prevented from being reset.
V-205911 WN19-SO-000100 CAT II Windows Server 2019 maximum age for machine account passwords must be configured to 30 days or less.
V-205824 WN19-SO-000110 CAT II Windows Server 2019 must be configured to require a strong session key.
V-205633 WN19-SO-000120 CAT II Windows Server 2019 machine inactivity limit must be set to 15 minutes or less, locking the system with the screen saver.
V-205631 WN19-SO-000130 CAT II Windows Server 2019 required legal notice must be configured to display before console logon.
V-205912 WN19-SO-000150 CAT II Windows Server 2019 Smart Card removal option must be configured to Force Logoff or Lock Workstation.
V-205825 WN19-SO-000160 CAT II Windows Server 2019 setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.
V-205826 WN19-SO-000170 CAT II Windows Server 2019 setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.
V-205655 WN19-SO-000180 CAT II Windows Server 2019 unencrypted passwords must not be sent to third-party Server Message Block (SMB) servers.
V-205827 WN19-SO-000190 CAT II Windows Server 2019 setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.
V-205828 WN19-SO-000200 CAT II Windows Server 2019 setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.
V-205915 WN19-SO-000240 CAT II Windows Server 2019 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
V-205916 WN19-SO-000260 CAT II Windows Server 2019 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
V-205917 WN19-SO-000270 CAT II Windows Server 2019 must prevent NTLM from falling back to a Null session.
V-205918 WN19-SO-000280 CAT II Windows Server 2019 must prevent PKU2U authentication using online identities.
V-205708 WN19-SO-000290 CAT II Windows Server 2019 Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.
V-205920 WN19-SO-000320 CAT II Windows Server 2019 must be configured to at least negotiate signing for LDAP client signing.
V-205921 WN19-SO-000330 CAT II Windows Server 2019 session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
V-205922 WN19-SO-000340 CAT II Windows Server 2019 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
V-205651 WN19-SO-000350 CAT II Windows Server 2019 users must be required to enter a password to access private keys stored on the computer.
V-205842 WN19-SO-000360 CAT II Windows Server 2019 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
V-205811 WN19-SO-000380 CAT II Windows Server 2019 User Account Control approval mode for the built-in Administrator must be enabled.
V-205716 WN19-SO-000390 CAT II Windows Server 2019 UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.
V-205717 WN19-SO-000400 CAT II Windows Server 2019 User Account Control must, at a minimum, prompt administrators for consent on the secure desktop.
V-205812 WN19-SO-000410 CAT II Windows Server 2019 User Account Control must automatically deny standard user requests for elevation.
V-205718 WN19-SO-000420 CAT II Windows Server 2019 User Account Control must be configured to detect application installations and prompt for elevation.
V-205719 WN19-SO-000430 CAT II Windows Server 2019 User Account Control (UAC) must only elevate UIAccess applications that are installed in secure locations.
V-205813 WN19-SO-000440 CAT II Windows Server 2019 User Account Control must run all administrators in Admin Approval Mode, enabling UAC.
V-205720 WN19-SO-000450 CAT II Windows Server 2019 User Account Control (UAC) must virtualize file and registry write failures to per-user locations.
V-205924 WN19-UC-000010 CAT II Windows Server 2019 must preserve zone information when saving attachments.
V-205749 WN19-UR-000010 CAT II Windows Server 2019 Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts.
V-205676 WN19-UR-000030 CAT II Windows Server 2019 Allow log on locally user right must only be assigned to the Administrators group.
V-205751 WN19-UR-000040 CAT II Windows Server 2019 Back up files and directories user right must only be assigned to the Administrators group.
V-205752 WN19-UR-000050 CAT II Windows Server 2019 Create a pagefile user right must only be assigned to the Administrators group.
V-205754 WN19-UR-000070 CAT II Windows Server 2019 Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service.
V-205755 WN19-UR-000080 CAT II Windows Server 2019 Create permanent shared objects user right must not be assigned to any groups or accounts.
V-205756 WN19-UR-000090 CAT II Windows Server 2019 Create symbolic links user right must only be assigned to the Administrators group.
V-205758 WN19-UR-000110 CAT II Windows Server 2019 Force shutdown from a remote system user right must only be assigned to the Administrators group.
V-205759 WN19-UR-000120 CAT II Windows Server 2019 Generate security audits user right must only be assigned to Local Service and Network Service.
V-205760 WN19-UR-000130 CAT II Windows Server 2019 Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service.
V-205761 WN19-UR-000140 CAT II Windows Server 2019 Increase scheduling priority: user right must only be assigned to the Administrators group.
V-205762 WN19-UR-000150 CAT II Windows Server 2019 Load and unload device drivers user right must only be assigned to the Administrators group.
V-205763 WN19-UR-000160 CAT II Windows Server 2019 Lock pages in memory user right must not be assigned to any groups or accounts.
V-205643 WN19-UR-000170 CAT II Windows Server 2019 Manage auditing and security log user right must only be assigned to the Administrators group.
V-205764 WN19-UR-000180 CAT II Windows Server 2019 Modify firmware environment values user right must only be assigned to the Administrators group.
V-205765 WN19-UR-000190 CAT II Windows Server 2019 Perform volume maintenance tasks user right must only be assigned to the Administrators group.
V-205766 WN19-UR-000200 CAT II Windows Server 2019 Profile single process user right must only be assigned to the Administrators group.
V-205767 WN19-UR-000210 CAT II Windows Server 2019 Restore files and directories user right must only be assigned to the Administrators group.
V-205768 WN19-UR-000220 CAT II Windows Server 2019 Take ownership of files or other objects user right must only be assigned to the Administrators group.
V-205664 WN19-00-000180 CAT III Windows Server 2019 non-administrative accounts or groups must only have print permissions on printer shares.
V-205800 WN19-00-000440 CAT III The Windows Server 2019 time service must synchronize with an appropriate DOD time source.
V-205856 WN19-00-000460 CAT III Windows Server 2019 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
V-205857 WN19-00-000470 CAT III Windows Server 2019 must have Secure Boot enabled.
V-205858 WN19-CC-000030 CAT III Windows Server 2019 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
V-205859 WN19-CC-000040 CAT III Windows Server 2019 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
V-205860 WN19-CC-000050 CAT III Windows Server 2019 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
V-205819 WN19-CC-000060 CAT III Windows Server 2019 must be configured to ignore NetBIOS name release requests except from WINS servers.
V-205691 WN19-CC-000200 CAT III Windows Server 2019 Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.
V-205870 WN19-CC-000260 CAT III Windows Server 2019 Windows Update must not obtain updates from other PCs on the Internet.
V-205871 WN19-CC-000320 CAT III Windows Server 2019 Turning off File Explorer heap termination on corruption must be disabled.
V-205726 WN19-DC-000160 CAT III Windows Server 2019 directory service must be configured to terminate LDAP-based network connections to the directory server after five minutes of inactivity.
V-205632 WN19-SO-000140 CAT III Windows Server 2019 title for legal banner dialog box must be configured with the appropriate text.
V-205923 WN19-SO-000370 CAT III Windows Server 2019 default permissions of global system objects must be strengthened.