Forge Home

harden_windows_server

Hardens Windows Server 2008 R2

11,987 downloads

10,183 latest version

4.6 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Support the Puppet Community by contributing to this module

You are welcome to contribute to this module by suggesting new features, currency updates, or fixes. Every contribution is valuable to help ensure that the module remains compatible with the latest Puppet versions and continues to meet community needs. Complete the following steps:

  1. Review the module’s contribution guidelines and any licenses. Ensure that your planned contribution aligns with the author’s standards and any legal requirements.
  2. Fork the repository on GitHub, make changes on a branch of your fork, and submit a pull request. The pull request must clearly document your proposed change.

For questions about updating the module, contact the module’s author.

Version information

  • 0.1.22 (latest)
  • 0.1.21
  • 0.1.20
  • 0.1.19
  • 0.1.18
  • 0.1.16
  • 0.1.14
  • 0.1.12
  • 0.1.10
  • 0.1.8
  • 0.1.6
  • 0.1.4
  • 0.1.2
released Oct 12th 2017
This version is compatible with:

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'autostructure-harden_windows_server', '0.1.22'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add autostructure-harden_windows_server
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install autostructure-harden_windows_server --version 0.1.22

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download

Documentation

autostructure/harden_windows_server — version 0.1.22 Oct 12th 2017

harden_windows_server

Module Description

This module hardens Windows Server 2008 R2 to the most recent CIS Benchmark, which can be found here:

https://www.cisecurity.org/cis-benchmarks/

Setup

To use this module, you need to specify whether or not the node is a Domain Controller or a Member Server by modifying the is_domain_controller parameter. The CIS Benchmark recommends a different security configuration for each type of node. This module defaults to the Member Server configuration.

Instantiate the class as a Domain Controller:

class { 'harden_windows_server':
  is_domain_controller => true,
}

Instantiate the class as a Member Server:

class { 'harden_windows_server':
  is_domain_controller => false,
}

Usage

The CIS Benchmark has two types of security configurations: Level 1 and Level 2.

Level 1 items intend to:

  • be practical and prudent;
  • provide a clear security benefit; and
  • not inhibit the utility of the technology beyond acceptable means.

Level 2 items exhibit one or more of the following characteristics:

  • are intended for environments or use cases where security is paramount
  • acts as defense in depth measure
  • may negatively inhibit the utility or performance of the technology

By default, all Level 1 items are managed by the module. However, each organization is unique and might need to disable certain Level 1 items so that they can configure them themselves. See our reference for a list of all managed items and disable them as shown below, if needed.

For example, the ensure_account_lockout_duration_is_set_to_15_or_more_minutes item sets the lockout duration to 30 minutes by default. If your organization requires a different lockout duration, disable this parameter so you can manually configure it. In a future release, you will be able to manage custom values within the module.

Disable ensure_account_lockout_duration_is_set_to_15_or_more_minutes:

class { 'harden_windows_server':
  is_domain_controller => false,
  ensure_account_lockout_duration_is_set_to_15_or_more_minutes => false,
}

Level 2 items are not managed, by default. To enable a Level 2 item, find the parameter in our reference and set it to true.

Enable ensure_log_on_as_a_batch_job_is_set_to_administrators:

class { 'harden_windows_server':
  is_domain_controller => false,
  ensure_log_on_as_a_batch_job_is_set_to_administrators => true,
}

Reference

Level 1

Control Enforced Notes
MS DC N/A
1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)' X X 24 passwords
1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' X X 42 days
1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)' X X 1 day
1.1.4 Ensure 'Minimum password length' is set to '14 or more character(s)' X X 14 characters
1.1.5 Ensure 'Password must meet complexity requirements' is set to 'Enabled' X X
1.1.6 Ensure 'Store passwords using reversible encryption' is set to 'Disabled' X X
1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)' X X 30 minutes
1.2.2 Ensure 'Account lockout threshold' is set to '10 or fewer invalid logon attempt(s), but not 0' X X 10 attempts
1.2.3 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)' X X 30 minutes
2.2.1 Ensure 'Acceess Credential Manager as a trusted calls' is set to 'No One' X X
2.2.2 Configure 'Access this computer from the network' X X
2.2.3 Ensure 'Act as part of the operating system' is set to 'No One' X X
2.2.4 Ensure 'Add workstations to domain' is set to 'Administrators' (DC only) X
2.2.5 Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE' X X
2.2.6 Configure 'Allow log on locally' X X
2.2.7 Configure 'Allow log on through Remote Desktop Services' X X
2.2.8 Ensure 'Back up files and directories' is set to 'Administrators' X X
2.2.9 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE' X X
2.2.10 Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE' X X
2.2.11 Ensure 'Create a pagefile' is set to 'Administrators' X X
2.2.12 Ensure 'Create a token object' is set to 'No One' X X
2.2.13 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' X X
2.2.14 Ensure 'Create permanent shared objects' is set to 'No One' X X
2.2.15 Configure 'Create symbolic links' X X Manually configure this if the hyper-v role is activated
2.2.16 Ensure 'Debug programs' is set to 'Administrators' X X
2.2.17 Configure 'Deny access to this computer from the network' X X
2.2.18 Ensure 'Deny log on as a batch job' to include 'Guests' X X
2.2.19 Ensure 'Deny log on as a service' to include 'Guests' X X
2.2.20 Ensure 'Deny log on locally' to include 'Guests' X X
2.2.21 Ensure 'Deny log on through Remote Desktop Services' to include 'Guests, Local account' X X
2.2.22 Configure 'Enable computer and user accounts to be trusted for delegation' X X
2.2.23 Ensure 'Force shutdown from a remote system' is set to 'Administrators' X X
2.2.24 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE' X X
2.2.25 Configure 'Impersonate a client after authentication' X X Manually configure this if the web server role is activated
2.2.26 Ensure 'Increase scheduling priority' is set to 'Administrators' X X
2.2.27 Ensure 'Load and unload device drivers' is set to 'Administrators' X X
2.2.28 Ensure 'Lock pages in memory' is set to 'No One' X X
2.2.30 Configure 'Manage auditing and security log' X X Manually configure this if using exchange
2.2.31 Ensure 'Modify an object label' is set to 'No One' X X
2.2.32 Ensure 'Modify firmware environment values' is set to 'Administrators' X X
2.2.33 Ensure 'Perform volume maintenance tasks' is set to 'Administrators' X X
2.2.34 Ensure 'Profile single process' is set to 'Administrators' X X
2.2.35 Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost' X X
2.2.36 Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE' X X
2.2.37 Ensure 'Restore files and directories' is set to 'Administrators' X X
2.2.38 Ensure 'Shut down the system' is set to 'Administrators' X X
2.2.39 Ensure 'Synchronize directory service data' is set to 'No One' (DC ONLY) X
2.2.40 Ensure 'Take ownership of files or other objects' is set to 'Administrators' X X
2.3.1.1 Ensure 'Accounts: Administrator account status' is set to 'Disabled' X Must configure manually
2.3.1.2 Ensure 'Accounts: Guest account status' is set to 'Disabled' X Must configure manually
2.3.1.3 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled' X X
2.3.1.4 Configure 'Accounts: Rename administrator account' X X adminaccount
2.3.1.5 Configure 'Accounts: Rename guest account' X X guestaccount
2.3.2.1 Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled' X X
2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' X X
2.3.4.1 Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators X X
2.3.4.2 Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled' X X
2.3.5.1 Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC ONLY) X
2.3.5.2 Ensure 'Domain controller: LDAP server signing requirements' is set to 'Require signing' (DC ONLY) X
2.3.5.3 Ensure 'Domain controller: Refuse machine account password changes' is set to 'Disabled' (DC ONLY) X
2.3.6.1 Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled' X X
2.3.6.2 Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled' X X
2.3.6.3 Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled' X X
2.3.6.4 Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled' X X
2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' X X
2.3.6.6 Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled' X X
2.3.7.1 Ensure 'Interactive logon: Do not display last user name' is set to 'Enabled' X X
2.3.7.2 Ensure 'Interactive logon: Do not require CTRL+ALT_DEL' is set to 'Disabled' X X
2.3.7.3 Configure 'Interactive logon: Message text for users attempting to log on' X Organizations should use their own text
2.3.7.4 Configure 'Interactive logon: Message title for users attempting to log on' X Organizations should use their own text
2.3.7.5 Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to '4 or fewer logons' (MS ONLY) X
2.3.7.6 Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days' X X
2.3.7.7 Ensure 'Interactive logon: Require Domain Controller Authentication to unlock workstation' is set to 'Enabled' (MS ONLY) X
2.3.7.8 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher X X
2.3.8.1 Ensure 'Microsoft network client: Disitally sign communications (always)' is set to 'Enabled' X X
2.3.8.2 Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled' X X
2.3.8.3 Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled' X X
2.3.9.1 Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minutes, but not 0' X X
2.3.9.2 Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled' X X
2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled' X X
2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled X X
2.3.9.5 Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or higher (MS ONLY) X
2.3.10.1 Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled' X X
2.3.10.2 Ensure 'Network access: Do not allow anonymous enumeration of SA accounts' is set to 'Enabled' (MS ONLY) X
2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shared' is set to 'Enabled' (MS ONLY) X
2.3.10.4 Ensure 'Network access: Do not allow storage of passwords and credentials for network authentication' is set to 'Enabled' X X
2.3.10.5 Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled' X X
2.3.10.6 Configure 'Network access: Named Pipes that can be accessed anonymously' X Support coming soon
2.3.10.7 Configure 'Network access: Remotely accessible registry paths' X X
2.3.10.8 Configure 'Network access: Remotely accessible registry paths and sub-paths' X X Manually configure this if using the Active Directory Certificate Services, Certification Authority, or WINS Server roles
2.3.10.9 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' X X
2.3.10.10 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' X Support coming soon
2.3.10.11 Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves' X X
2.3.11.1 Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to 'Enabled' X X
2.3.11.2 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' X X
2.3.11.3 Ensure 'Network security: Allow PKU2U authentication requests to this computer to use online identities' is set to 'Disabled X X
2.3.11.4 Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'RC4_HMAC_MD5, AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types' X X
2.3.11.5 Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled' X X
2.3.11.6 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled' X X
2.3.11.7 Ensure 'Network security: LAN Manager authenticatioin level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM' X X
2.3.11.8 Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher X X
2.3.11.9 Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption' X X
2.3.11.10 Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to 'Require NTLMv2 session security, Require 128-bit encryption' X X
2.3.13.1 Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled' X X
2.3.15.1 Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled' X X
2.3.15.2 Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled' X X
2.3.16.1 Ensure 'System settings: Optional subsystems' is set to 'Defined: (blank)' . X X
2.3.17.1 Ensure 'User Account Control: Admin Apprival Mode for the Built-in Administrator account' is set to 'Enabled' X X
2.3.17.2 Ensure 'User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop' is set to 'Disabled' X X
2.3.17.3 Ensure 'User Account Control: Behavrior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' X X
2.3.17.4 Ensure 'User Accounc Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' X X
2.3.17.5 Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled' X X
2.3.17.6 Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled' X X
2.3.17.7 Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled' X X
2.3.17.8 Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' X X
2.3.17.9 Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to 'Enabled' X X
9.1.1 Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)' X X
9.1.2 Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)' X X
9.1.3 Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)' X X
9.1.4 Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No' X X
9.1.5 Ensure 'Windows Firewall: Domain: Settings: Apply local firewall rules' is set to 'Yes (default)' X X
9.1.6 Ensure 'Windows Firewall: Domain: Settings: Apply local connection security rules' is set to 'Yes (default)' X X
9.1.7 Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SYSTEMROOT%\System32\logfiles\firewall\domainfw.log' X X
9.1.8 Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater' X X
9.1.9 Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes' X X
9.1.10 Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes' X X
9.2.1 Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)' X X
9.2.2 Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)' X X
9.2.3 Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)' X X
9.2.4 Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No' X X
9.2.5 Ensure 'Windows Firewall: Private: Settings: Apply local firewall rules' is set to 'Yes (default)' X X
9.2.6 Ensure 'Windows Firewall: Private: Settings: Apply local connection security rules' is set to 'Yes (default)' X X
9.2.7 Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SYSTEMROOT%\System32\logfiles\firewall\privatefw.log' X X
9.2.8 Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater' X X
9.2.9 Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes' X X
9.2.10 Ensure 'Windows Firewall: Private: Logging: Log successful connections' is set to 'Yes' X X
9.3.1 Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)' X X
9.3.2 Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)' X X
9.3.3 Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)' X X
9.3.4 Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'Yes' X X
9.3.5 Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No' X X
9.3.6 Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' X X
9.3.7 Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SYSTEMROOT%\System32\logfiles\firewall\publicfw.log' X X
9.3.8 Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater' X X
9.3.9 Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes' X X
9.3.10 Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes' X X
17.x.x Advanced Audit Policy Configuration X X
18.2.x LAPS X This section only applies if your organization is using LAPS
18.3.x MSS (Legacy) X This section only applies if your organization is using MSS (Legacy)
18.4.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled' X X
18.4.11.3 Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled' X X
18.4.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with "Require Mutual Authentication" and "Require Integrity" set for all NETLOGON and SYSVOL shares' X Support coming soon
18.4.19.2.1 Disable IPv6 (Ensure TCPIP6 Parameter 'DisabledComponents' is set to '0xff (255)') X Support coming soon
18.6.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' (MS ONLY) X Support coming soon
18.6.2 Ensure 'WDigest Authentication' is set to 'Disabled' X Support coming soon
18.8.3.1 Ensure 'Include command line in process creation events' is set to 'Disabled' X Support coming soon
18.8.6.2 Ensure 'Allow remote access to the Plug and Play interface' is set to 'Disabled' X X
18.8.19.2 Ensure 'configure registry policy processing: Do not apply during periodic background processing' is set to 'Enabled: FALSE' X X
18.8.19.3 Ensure 'Configure registry policy processing: Process even if the Group Policy objects have not changed' is set to 'Enabled: TRUE' X X
18.8.19.4 Ensure 'Turn off background refresh of Group Policy' is set to 'Disabled' X Support coming soon
18.8.25.1 Ensure 'Always use classic logon' is set to 'Enabled' (MS ONLY) X
18.8.31.1 Ensure 'Configure Offer Remote Assistance' is set to 'Disabled' X X
18.8.31.2 Ensure 'Configure Solicited Remote Assistance' is set to 'Disabled' X X
18.8.32.1 Ensure 'Enable RPC Endpoint Mapper Client Authentication' is set to 'Enabled' (MS ONLY) X
18.9.8.1 Ensure 'Disallow Autoplay for non-volume devices' is set to 'Enabled' X X
18.9.8.2 Ensure 'set the default behavior for AutoRun' is set to 'Enabled: Do not execute any autorun commands' X X
18.9.8.3 Ensure 'Turn off Autoplay' is set to 'Enabled: All drives' X X
18.9.15.1 Ensure 'Do not display the password reveal button' is set to 'Enabled' X Support coming soon
18.9.15.2 Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled' X X
18.9.18.1 Ensure 'Turn off desktop gadgets' is set to 'Enabled' X X
18.9.18.2 Ensure 'Turn off user-installed desktop gadgets' is set to 'Enabled' X X
18.9.24.x EMET X Support coming soon
18.9.26.1.1 Ensure 'Application: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' X X
18.9.26.1.2 Ensure 'Application: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' X X
18.9.26.2.1 Ensure 'Security: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' X X
18.9.26.2.2 Ensure 'Security: Specify the maximum log file size (KB)' is set to 'Enabled: 196,608 or greater' X X
18.9.26.3.1 Ensure 'Setup: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' X X
18.9.26.3.2 Ensure 'Setup: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' X X
18.9.26.4.1 Ensure 'System: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' X X
18.9.26.4.2 Ensure 'System: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' X X
18.9.30.2 Ensure 'Turn off Data Execution Prevention for Explorer' is set to 'Disabled' X X
18.9.30.3 Ensure 'Turn off heap termination on corruption' is set to 'Disabled' X X
18.9.30.4 Ensure 'Turn off shell protocol protected mode' is set to 'Disabled' X X
18.9.47.1 Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled' X Support coming soon
18.9.47.2 Ensure 'Prevent the usage of OneDrive for file storage on Windows 8.1' is set to 'Enabled' X Support coming soon
18.9.52.2.2 Ensure 'Do not allow passwords to be saved' is set to 'Enabled' X X
18.9.52.3.3.2 Ensure 'Do not allow drive redirection' is set to 'Enabled' X X
18.9.52.3.9.1 Ensure 'Always prompt for password upon connection' is set to 'Enabled' X X
18.9.52.3.9.2 Ensure 'Require secure RPC communication' is set to 'Enabled' X X
18.9.52.3.9.3 Ensure 'Set client connection encryption level' is set to 'Enabled: High Level' X X
18.9.52.3.11.1 Ensure 'Do not delete temp folders upon exit' is set to 'Disabled' X X
18.9.52.3.11.2 Ensure 'Do not use temporary folders per session' is set to 'Disabled' X X
18.9.53.1 Ensure 'Prevent downloading of enclosures' is set to 'Enabled' X X
18.9.54.2 Ensure 'Allow indexing of encrypted files' is set to 'Disabled' X Support coming soon
18.9.70.2.1 Ensure 'Configure Default consent' is set to 'Enabled: Always ask before sending data' X X
18.9.74.1 Ensure 'Allow user control over installs' is set to 'Disabled' X X
18.9.74.2 Ensure 'Always install with elevated privileges' is set to 'Disabled' X X
18.9.84.1 Ensure 'Turn on PowerShell Script Block Logging' is set to 'Disabled' X Support coming soon
18.9.84.2 Ensure 'Turn on PowerShell Transcription' is set to 'Disabled' X Support coming soon
18.9.86.1.1 Ensure 'Allow Basic authentication' is set to 'Disabled' X X
18.9.86.1.2 Ensure 'Allow unencrypted traffic' is set to 'Disabled' X X
18.9.86.1.3 Ensure 'Disallow Digest authentication' is set to 'Enabled' X X
18.9.86.2.1 Ensure 'Allow Basic authentication' is set to 'Disabled' X X
18.9.86.2.3 Ensure 'Allow unencrypted traffic' is set to 'Disabled' X X
18.9.86.2.4 Ensure 'Disallow WinRM from storing RunAs credentials' is set to 'Enabled' X Support coming soon
18.9.90.2 Ensure 'Configure Automatic Updates' is set to 'Enabled' X X
18.9.90.3 Ensure 'Configure Automatic Updates: Schedule install day' is set to '0 - Every day' X X
18.9.90.4 Ensure 'Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box' is set to 'Disabled' X X
18.9.90.5 Ensure 'Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box' is set to 'Disabed' X X
18.9.90.6 Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled' X X
18.9.90.7 Ensure 'Reschedule Automatic Updates scheduled installations' is set to 'Enabled: 1 minute' X X
19.x.x.x.x Administrative Templates (User) X Support coming soon

Level 2

Control Enforced Notes
MS DC N/A
2.2.29 Ensure 'Log on as a batch job' is set to 'Administrators' (DC ONLY) X
18.4.9.1 Ensure 'Turn on Mapper I/O (LLTDIO) driver' is set to 'Disabled' X X
18.4.9.2 Ensure 'Turn on Responder (RSPNDR) driver' is set to 'Disabled' X X
18.4.10.2 Ensure 'Turn off Microsoft Peer-to-Peer Networking Services' is set to 'Enabled' X X
18.4.20.1 Ensure 'Configuration of wireless settings using Windows Connect Now' is set to 'Disabled' X X
18.4.20.2 Ensure 'Prohibit access of the Windows Connect Now wizards' is set to 'Enabled' X X
18.8.20.1.x Internet Communication Settings X Support coming soon
18.8.29.5.1 Ensure 'Require a password when a computer wakes (on battery)' is set to 'Enabled' X Support coming soon
18.8.29.5.2 Ensure 'Require a password when a computer wakes (plugged in)' is set to 'Enabled X Support coming soon
18.8.32.2 Ensure 'Restrict Unauthenticated RPC clients' is set to 'Enabled: Authenticated' (MS ONLY) X Support coming soon
18.8.39.5.1 Ensure 'Microsoft Support Diagnostic Tool: Turn on MSDT interactive communication with support provider' is set to 'Disabled' X Support coming soon
18.8.39.11.1 Ensure 'Enable/Disable PerfTrack' is set to 'Disabled' X Support coming soon
18.8.44.1.1 Ensure 'Enable Windows NTP Client' is set to 'Enabled' X Support coming soon
18.8.44.1.2 Ensure 'Enable Windows NTP Server' is set to 'Disabled' (MS ONLY) X Support coming soon
18.9.37.1 Ensure 'Turn off location' is set to 'Enabled' X X
18.9.52.3.2.1 Ensure 'Restrict Remote Desktop Services users to a single Remote Desktop Services session' is set to 'Enabled' X X
18.9.52.3.3.1 Ensure 'Do not allow COM port redirection' is set to 'Enabled' X X
18.9.52.3.3.3 Ensure 'Do not allow LPT port redirection' is set to 'Enabled' X X
18.9.52.3.3.4 Ensure 'Do not allow supported Plug and Play device redirection' is set to 'Enabled' X X
18.9.52.3.10.1 Ensure 'Set time limit for active but idle Remote Desktop Services sessions' is set to 'Enabled: 15 minutes or less' X X
18.9.52.3.10.2 Ensure 'Set time limit for disconnected sessions' is set to 'Enabled: 1 minute' X X
18.9.69.3.1 Ensure 'Join Microsoft MAPS' is set to 'Disabled' X Support coming soon
18.9.74.3 Ensure 'Prevent Internet Explorer security prompt for Windows Installer scripts' is set to 'Disabled' X X
18.9.86.2.2 Ensure 'Allow remote server management through WinRM' is set to 'Disabled' X Support coming soon
18.9.87.1 Ensure 'Allow Remote Shell Access' is set to 'Disabled' X X

Variable List

These variables should be used to override default values. They correspond with the controls above.

$is_domain_controller
$ensure_enforce_password_history_is_set_to_24_or_more_passwords
$ensure_maximum_password_age_is_set_to_60_or_fewer_days_but_not_0
$ensure_minimum_password_age_is_set_to_1_or_more_days
$ensure_minimum_password_length_is_set_to_14_or_more_characters
$ensure_password_must_meet_complexity_requirements_is_set_to_enabled
$ensure_store_passwords_using_reversible_encryption_is_set_to_disabled
$ensure_account_lockout_duration_is_set_to_15_or_more_minutes
$ensure_account_lockout_threshold_is_set_to_10_or_fewer_invalid_logon_attempts_but_not_0
$ensure_reset_account_lockout_counter_after_is_set_to_15_or_more_minutes
$ensure_access_credential_manager_as_a_trusted_caller_is_set_to_no_one
$configure_access_this_computer_from_the_network
$ensure_act_as_part_of_the_operating_system_is_set_to_no_one
$ensure_add_workstations_to_domain_is_set_to_administrators
$ensure_adjust_memory_quotas_for_a_process_is_set_to_administrators_local_service_network_service
$configure_allow_log_on_locally
$configure_allow_log_on_through_remote_desktop_services
$ensure_back_up_files_and_directories_is_set_to_administrators
$ensure_change_the_system_time_is_set_to_administrators_local_service
$ensure_change_the_time_zone_is_set_to_administrators_local_service
$ensure_create_a_pagefile_is_set_to_administrators
$ensure_create_a_token_object_is_set_to_no_one
$ensure_create_global_objects_is_set_to_administrators_local_service_network_service_service
$ensure_create_permanent_shared_objects_is_set_to_no_one
$configure_create_symbolic_links
$ensure_debug_programs_is_set_to_administrators
$configure_deny_access_to_this_computer_from_the_network
$ensure_deny_log_on_as_a_batch_job_to_include_guests
$ensure_deny_log_on_as_a_service_to_include_guests
$ensure_deny_log_on_locally_to_include_guests
$ensure_deny_log_on_through_remote_desktop_services_to_include_guests_local_account
$configure_enable_computer_and_user_acounts_to_be_trusted_for_delegation
$ensure_force_shutdown_from_a_remote_system_is_set_to_administrators
$ensure_generate_security_audits_is_set_to_local_service_network_service
$configure_impersonate_a_client_after_authentication
$ensure_increase_scheduling_priority_is_set_to_administrators
$ensure_load_and_unload_device_drivers_is_set_to_administrators
$ensure_lock_pages_in_menory_is_set_to_no_one
$ensure_log_on_as_a_batch_job_is_set_to_administrators #LEVEL 2
$configure_manage_auditing_and_security_log
$ensure_modify_an_object_label_is_set_to_no_one
$ensure_modify_firmware_environment_values_is_set_to_administrators
$ensure_perform_volume_maintenance_tasks_is_set_to_administrators
$ensure_profile_single_process_is_set_to_administrators
$ensure_profile_system_performance_is_set_to_administrators_nt_service_wdiservicehost
$ensure_replace_a_process_level_token_is_set_to_local_service_network_service
$ensure_restore_files_and_directories_is_set_to_administrators
$ensure_shut_down_the_system_is_set_to_administrators
$ensure_synchronize_directory_service_data_is_set_to_no_one
$ensure_take_ownership_of_files_or_other_objects_is_set_to_administrators
$ensure_accounts_administrator_account_status_is_set_to_disabled
$ensure_accounts_guest_account_status_is_set_to_disabled
$ensure_accounts_limit_local_account_use_of_blank_password_to_console_logon_only_is_set_to_enabled
$configure_accounts_rename_administrator_account
$configure_accounts_rename_guest_account
$ensure_audit_force_audit_policy_subcategory_settings_to_override_audit_policy_category_settings
$ensure_audit_shut_down_system_immediately_if_unable_to_log_security_audits_is_set_to_disabled
$ensure_devices_allowed_to_format_and_eject_removable_media_is_set_to_administrators
$ensure_devices_prevent_users_from_installing_printer_drivers_is_set_to_enabled
$ensure_domain_controller_allow_server_operators_to_schedule_tasks_is_set_to_disabled
$ensure_domain_controller_ldap_server_signing_requirements_is_set_to_require_signing
$ensure_domain_controller_refuse_machine_account_password_changes_is_set_to_disabled
$ensure_domain_member_digitally_encrypt_or_sign_secure_channel_data_always_is_set_to_enabled
$ensure_domain_member_digitally_encrypt_or_sign_secure_channel_data_when_possible_is_set_to_enabled
$ensure_domain_member_digitally_sign_secure_channel_data_when_possible_is_set_to_enabled
$ensure_domain_member_disable_machine_account_password_changes_is_set_to_disabled
$ensure_domain_member_maximum_machine_account_password_age_is_set_to_30_or_fewer_days_but_not_0
$ensure_domain_member_require_strong_session_key_windows_2000_or_later_is_set_to_enabled
$ensure_interactive_logon_do_not_display_last_user_name_is_set_to_enabled
$ensure_interactive_logon_do_not_require_ctrl_alt_del_is_set_to_disabled
$configure_interactive_logon_message_text_for_users_attempting_to_log_on
$configure_interactive_logon_message_title_for_users_attempting_to_log_on
$ensure_interactive_logon_number_of_previous_logons_to_cache_is_set_to_4_or_fewer_logons #LEVEL 2
$ensure_interactive_logon_prompt_user_to_change_password_before_expiration_is_set_to_between_5_and_14_days
$ensure_interactive_logon_require_domain_controller_authentication_to_unlock_workstation_is_set_to_enabled
$ensure_interactive_logon_smart_card_removal_behavior_is_set_to_lock_workstation_or_higher
$ensure_microsoft_network_client_digitally_sign_communications_always_is_set_to_enabled
$ensure_microsoft_network_client_digitally_sign_communications_if_server_agrees_is_set_to_enabled
$ensure_microsoft_network_client_send_unencrypted_password_to_third_party_smb_servers_is_set_to_disabled
$ensure_microsoft_network_server_idle_time_required_before_suspending_session_is_set_to_15_or_fewer_minutes
$ensure_microsoft_network_server_digitally_sign_communications_always_is_set_to_enabled
$ensure_microsoft_network_server_digitally_sign_communications_if_client_agrees_is_set_to_enabled
$ensure_microsoft_network_server_disconnect_clients_when_logon_hours_expire_is_set_to_enabled
$ensure_microsoft_network_server_spn_target_name_validation_level_is_set_to_accept_if_provided_by_client
$ensure_network_access_allow_anonymous_sid_name_tranlation_is_set_to_disabled
$ensure_network_access_do_not_allow_anonymous_enumeration_of_sam_accounts_is_set_to_enabled
$ensure_network_access_do_not_allow_anonymous_enumeration_of_sam_accounts_and_shared_is_set_to_enabled
$ensure_network_access_do_not_allow_storage_of_password_and_credentials_for_authentication_is_set_to_enabled #LEVEL 2
$ensure_network_access_let_everyone_permissions_apply_to_anonymous_users_is_set_to_disabled
$configure_network_access_named_pipes_that_can_be_accessed_anonymously
$configure_network_access_remotely_accessible_registry_paths
$configure_network_access_remotely_accessible_registry_paths_and_sub_paths
$ensure_network_access_restrict_anonymous_access_to_named_pipes_and_shares_is_set_to_enabled
$ensure_network_access_shares_that_can_be_accessed_anonymously_is_set_to_none
$ensure_network_access_sharing_and_security_model_for_local_accounts_is_set_to_classic
$ensure_network_security_allow_local_system_to_use_computer_identity_for_ntlm_is_set_to_enabled
$ensure_network_security_allow_localsystem_null_session_fallback_is_set_to_disabled
$ensure_network_security_allow_pku2u_authentication_requests_to_use_online_identities_is_set_to_disabled
$ensure_network_security_configure_encryption_types_allow_for_kerberos
$ensure_network_security_do_not_store_lan_manager_hash_value_on_next_password_change_is_set_to_enabled
$ensure_network_security_force_logoff_when_logon_hours_expire_is_set_to_enabled
$ensure_network_security_lan_manager_authentication_level_is_set_to_send_ntlmv2_response_only
$ensure_network_security_ldap_client_signing_requirements_is_set_to_negotiate_signing
$ensure_network_security_minimum_session_security_for_ntlm_ssp_based_clients
$ensure_network_security_minimum_session_security_for_ntlm_ssp_based_servers
$ensure_shutdown_allow_system_to_be_shutdown_without_having_to_logon_is_set_to_disabled
$ensure_system_objects_require_case_insensitivity_for_non_windows_subsystems_is_enabled
$ensure_system_objects_strengthen_default_permissions_of_internal_system_objects_is_enabled
$ensure_system_settings_optional_subsystems_is_set_to_defined_blank
$ensure_user_account_control_admin_approval_mode_for_the_admin_account_is_enabled
$ensure_user_account_control_allow_uiaccess_applications_to_prompt_for_elevation_is_disabled
$ensure_user_account_control_behavior_of_the_elevation_prompt_for_administrators_in_admin_approval_mode
$ensure_user_account_control_behavior_of_the_elevation_prompt_for_standard_users
$ensure_user_account_control_detect_application_installations_and_prompt_for_elevation_is_enabled
$ensure_user_account_control_only_elevate_uiaccess_applications_that_are_installed_in_secure_locations
$ensure_user_account_control_run_all_administrators_in_admin_approval_mode_is_enabled
$ensure_user_account_control_switch_to_the_secure_desktop_when_prompting_for_elevation_is_enabled
$ensure_user_account_control_virtualize_file_and_registry_write_failures_to_per_user_location_is_enabled
$ensure_windows_firewall_domain_firewall_state_is_set_to_on_recommended
$ensure_windows_firewall_domain_inbound_connections_is_set_to_block_default
$ensure_windows_firewall_domain_outbound_connections_is_set_to_allow_default
$ensure_windows_firewall_domain_settings_display_a_notification_is_set_to_no
$ensure_windows_firewall_domain_settings_apply_local_firewall_rules_is_set_to_yes_default
$ensure_windows_firewall_domain_settings_apply_local_connection_security_rules_is_yes
$ensure_windows_firewall_domain_logging_name_is_set_to_domainfwlog
$ensure_windows_firewall_domain_logging_size_limit_is_16384_or_greater
$ensure_windows_firewall_domain_logging_log_dropped_packets_is_set_to_yes
$ensure_windows_firewall_domain_logging_log_successful_connections_is_set_to_yes
$ensure_windows_firewall_private_firewall_state_is_set_to_on_recommended
$ensure_windows_firewall_private_inbound_connections_is_set_to_block_default
$ensure_windows_firewall_private_outbound_connections_is_set_to_allow_default
$ensure_windows_firewall_private_settings_display_a_notification_is_set_to_no
$ensure_windows_firewall_private_settings_apply_local_firewall_rules_is_set_to_yes_default
$ensure_windows_firewall_private_settings_apply_local_connection_security_rules_is_set_to_yes_default
$ensure_windows_firewall_private_logging_name_is_set_to_privatefwlog
$ensure_windows_firewall_private_logging_size_limit_is_set_to_16384_or_greater
$ensure_windows_firewall_private_logging_log_dropped_packets_is_set_to_yes
$ensure_windows_firewall_private_logging_log_successful_connections_is_set_to_yes
$ensure_windows_firewall_public_firewall_state_is_set_to_on_recommended
$ensure_windows_firewall_public_inbound_connections_is_set_to_block_default
$ensure_windows_firewall_public_outbound_connections_is_set_to_allow_default
$ensure_windows_firewall_public_settings_display_a_notification_is_set_to_yes
$ensure_windows_firewall_public_settings_apply_local_firewall_rules_is_set_to_no
$ensure_windows_firewall_public_settings_apply_local_connection_security_rules_is_set_to_no
$ensure_windows_firewall_public_logging_name_is_set_to_publicfwlog
$ensure_windows_firewall_public_logging_size_limit_is_set_to_16384_or_greater
$ensure_windows_firewall_public_logging_log_dropped_packets_is_set_to_yes
$ensure_windows_firewall_public_logging_log_successful_connections_is_set_to_yes
$advanced_audit_policy_configuration
$ensure_laps_admpwd_gpo_extension_cse_is_installed #MS ONLY
$ensure_do_not_allow_password_expiration_time_longer_than_required_by_policy_is_set_to_enabled
$ensure_enable_local_admin_password_management_is_set_to_enabled
$ensure_password_settings_password_complexity_is_set_to_enabled_large_letters_small_letters_numbers_special_characters
$ensure_password_settings_password_length_is_set_to_enabled_15_or_more
$ensure_password_settings_password_age_days_is_set_to_enabled_30_or_fewer
$ensure_mss_autoadminlogon_enable_automatic_logon_not_recommended_is_set_to_disabled
$ensure_mss_disableipsourcerouting_ipv6_ip_source_routing_protection_level_is_set_to_enabled_highest_protection_source_routing_disabled
$ensure_mss_disableipsourcerouting_ip_source_routing_protection_level_is_set_to_enabled_highest_protection_source_routing_disabled
$ensure_mss_enableicmpredirect_allow_icmp_redirects_to_override_ospf_generated_routes_is_set_to_disabled
$ensure_mss_keepalivetime_how_often_keepalive_packets_are_sent_in_millisecondsis_set_to_enabled_300000_or_5_minutes #LEVEL 2
$ensure_mss_nonamereleaseondemand_allow_the_computer_to_ignore_netbios_name_release_requests_except_from_wins_server_is_enabled
$ensure_mss_performrouterdiscovery_allow_irdp_to_detect_and_configure_default_gateway_addresses_is_set_to_disabled #LEVEL 2
$ensure_mss_safediisearchmode_enable_safe_dll_search_mode_is_set_to_enabled
$ensure_mss_screensavergraceperiod_the_time_in_seconds_before_the_screen_saver_grace_period_expired_is_set_to_enabled_5_or_fewer
$ensure_mss_tcpmaxdataretranmissions_ipv6_how_many_times_unacknowledged_data_is_retransmitted_is_set_to_enabled_3
$ensure_mss_tcpmaxdataretransmissions_how_many_times_unacknowledged_data_is_retransmitted_is_set_to_enabled_3
$ensure_mss_warninglevel_percentage_threshold_for_the_security_event_log_is_set_to_enabled_90_or_less
$ensure_turn_on_mapper_io_lltdio_driver_is_set_to_disabled #LEVEL 2
$ensure_turn_on_responder_rspndr_driver_is_set_to_disabled #LEVEL 2
$ensure_turn_off_microsoft_peer_to_peer_networking_services_is_set_to_enabled #LEVEL 2
$ensure_prohibit_installation_and_configuration_of_network_bridge_on_your_dns_domain_network_is_set_to_enabled
$ensure_require_domain_users_to_elevate_when_setting_a_networks_location_is_set_to_enabled
$ensure_hardened_unc_paths_is_set_to_enabled_with_require_mutual_authentication_and_require_integrity_for_all_netlogon_and_sysvol_shares
$disable_ipv6_ensure_tcpip6_parameter_disabledcomponents_is_set_to_0xff255 #LEVEL 2
$ensure_configuration_of_wireless_settings_using_windows_connect_now_is_set_to_disabled #LEVEL 2
$ensure_prohibit_access_of_the_windows_connect_now_wizards_is_set_to_enabled #LEVEL 2
$ensure_apply_uac_restrictions_to_local_accounts_on_network_logons_is_set_to_enabled
$ensure_wdigest_authentication_is_set_to_disabled
$ensure_include_command_line_in_process_creation_events_is_set_to_disabled
$ensure_allow_remote_access_to_the_plug_and_play_interface_is_set_to_disabled
$ensure_configure_registry_policy_processing_do_not_apply_during_periodic_background_processing_is_set_to_enabled_false
$ensure_configure_registry_policy_processing_process_even_if_the_group_policy_objects_have_not_changed_is_set_to_enabled_true
$ensure_turn_off_background_refresh_of_group_policy_is_set_to_disabled
$ensure_turn_off_downloading_of_print_drivers_over_http_is_set_to_enabled #LEVEL 2
$ensure_turn_off_handwriting_personalization_data_sharing_is_set_to_enabled #LEVEL 2
$ensure_turn_off_handwriting_recognition_error_reporting_is_set_to_enabled #LEVEL 2
$ensure_turn_off_internet_connection_wizard_if_url_connection_is_referring_to_microsoftcom_is_set_to_enabled #LEVEL 2
$ensure_turn_off_internet_download_for_web_publishing_and_online_ordering_wizards_is_set_to_enabled #LEVEL 2
$ensure_turn_off_internet_file_association_service_is_set_to_enabled #LEVEL 2
$ensure_turn_off_printing_over_http_is_set_to_enabled #LEVEL 2
$ensure_turn_off_registration_if_url_connection_is_referring_to_microsoftcom_is_set_to_enabled #LEVEL 2
$ensure_turn_off_search_companion_content_file_updates_is_set_to_enabled #LEVEL 2
$ensure_turn_off_the_order_prints_picture_task_is_set_to_enabled #LEVEL 2
$ensure_turn_off_the_publish_to_web_task_for_files_and_folders_is_set_to_enabled #LEVEL 2
$ensure_turn_off_the_windows_messenger_customer_experience_improvement_program_is_set_to_enabled #LEVEL 2
$ensure_turn_off_windows_customer_experience_improvement_program_is_set_to_enabled #LEVEL 2
$ensure_turn_off_windows_error_reporting_is_set_to_enabled #LEVEL 2
$ensure_always_use_classic_logon #MS ONLY
$ensure_require_a_password_when_a_computer_wakes_on_battery_is_set_to_enabled #LEVEL 2
$ensure_require_a_password_when_a_computer_wakes_plugged_in_is_set_to_enabled #LEVEL 2
$ensure_configure_offer_remote_assistance_is_set_to_disabled
$ensure_configure_solicited_remote_assistance_is_set_to_disabled
$ensure_enable_rpc_endpoint_mapper_client_authentication_is_set_to_enabled #MS ONLY
$ensure_restrict_unauthenticated_rpc_clients_is_set_to_enabled_authenticatied #LEVEL 2 MS ONLY
$ensure_microsoft_support_diagnostic_tool_turn_on_msdt_interactive_communication_with_support_provider_is_set_to_disabled #LEVEL 2
$ensure_enable_disable_perftrack_is_set_to_disabled #LEVEL 2
$ensure_enable_windows_ntp_client_is_set_to_enabled #LEVEL 2
$ensure_enable_windows_ntp_server_is_set_to_disabled #LEVEL 2 MS ONLY
$ensure_disallow_autoplay_for_non_volume_devices_is_set_to_enabled
$ensure_set_the_default_behavior_for_autorun_is_set_to_enabled_do_not_execute_any_autorun_commands
$ensure_turn_off_autoplay_is_set_to_enabled_all_drives
$ensure_do_not_display_the_password_reveal_button_is_set_to_enabled
$ensure_enumerate_administrator_accounts_on_elevation_is_set_to_disabled
$ensure_turn_off_desktop_gadgets_is_set_to_enabled
$ensure_turn_off_user_installed_desktop_gadgets_is_set_to_enabled
$ensure_emet_551_or_higher_is_installed
$ensure_default_action_and_mitigation_settings_is_set_to_enabled_plus_subsettings
$ensure_default_protections_for_internet_explorer_is_set_to_enabled
$ensure_default_protections_for_popular_software_is_set_to_enabled
$ensure_default_protections_for_recommended_software_is_set_to_enabled
$ensure_system_aslr_is_set_to_enabled_application_opt_in
$ensure_system_dep_is_set_to_enabled_application_opt_out
$ensure_system_sehop_is_set_to_enabled_application_opt_out
$ensure_application_control_event_log_behavior_when_the_log_file_reaches_its_maximum_size_is_set_to_disabled
$ensure_application_specify_the_maximum_log_file_size_kb_is_set_to_enabled_32768_or_greater
$ensure_security_control_event_log_behavior_when_the_log_file_reaches_its_maximum_size_is_set_to_disabled
$ensure_security_specify_the_maximum_log_file_size_kb_is_set_to_enabled_196608_or_greater
$ensure_setup_control_event_log_behavior_when_the_log_reaches_its_maximum_size_is_set_to_disabled
$ensure_setup_specify_the_maximum_log_file_size_kb_is_set_to_enabled_32768_or_greater
$ensure_system_control_event_log_behavior_when_the_log_file_reaches_its_maximum_size_is_set_to_disabled
$ensure_system_specify_the_maximum_log_file_size_kb_is_set_to_enabled_32768_or_greater
$ensure_turn_off_data_execution_prevention_for_explorer_is_set_to_disabled
$ensure_turn_off_heap_termination_on_corruption_is_set_to_disabled
$ensure_turn_off_shell_protocol_proteted_mode_is_set_to_disabled
$ensure_turn_off_location_is_set_to_enabled #LEVEL 2
$ensure_prevent_the_usage_of_onedrive_for_filestorage_is_set_to_enabled
$ensure_prevent_the_usage_of_onedrive_for_file_storage_on_windows_81_is_set_to_enabled
$ensure_do_not_allow_passwords_to_be_saved_is_set_to_enabled
$ensure_restrict_remote_desktop_services_users_to_a_single_remote_desktop_services_session_is_set_to_enabled #LEVEL 2
$ensure_do_not_allow_com_port_redirection_is_set_to_enabled #LEVEL 2
$ensure_do_not_allow_drive_redirection_is_set_to_enabled
$ensure_do_not_allow_lpt_port_redirection_is_set_to_enabled #LEVEL 2
$ensure_do_not_allow_supported_plug_and_play_device_redirection_is_set_to_enabled #LEVEL 2
$ensure_always_prompt_for_password_upon_connection_is_set_to_enabled
$ensure_require_secure_rpc_communication_is_set_to_enabled
$ensure_set_client_connection_encryption_level_is_set_to_enabled_high_level
$ensure_set_time_limit_for_active_but_idle_remote_desktop_services_sessions_is_set_to_enabled_15_minutes_or_less #LEVEL 2
$ensure_set_time_limit_for_disconnected_sessions_is_set_to_enabled_1_minute #LEVEL 2
$ensure_do_not_delete_temp_folders_upon_exit_is_set_to_disabled
$ensure_do_not_use_temporary_folders_per_session_is_set_to_disabled
$ensure_prevent_downloading_of_enclosures_is_set_to_enabled
$ensure_allow_indexing_of_encrypted_files_is_set_to_disabled
$ensure_join_microsoft_maps_is_set_to_disabled #LEVEL 2
$ensure_configure_default_consent_is_set_to_enabled_always_ask_before_sending_data
$ensure_allow_user_control_over_installs_is_set_to_disabled
$ensure_always_install_with_elevated_privileges_is_set_to_disabled
$ensure_prevent_internet_explorer_security_prompt_for_windows_installer_scripts_is_set_to_disabled #LEVEL 2
$ensure_turn_on_powershell_script_block_logging_is_set_to_disabled
$ensure_turn_on_powershell_transcription_is_set_to_disabled
$ensure_winrm_client_allow_basic_authentication_is_set_to_disabled
$ensure_winrm_client_allow_unencrypted_traffic_is_set_to_disabled
$ensure_disallow_digest_authentication_is_set_to_enabled
$ensure_winrm_service_allow_basic_authentication_is_set_to_disabled
$ensure_allow_remote_server_management_through_winrm_is_set_to_disabled #LEVEL 2
$ensure_winrm_service_allow_unencrypted_traffic_is_set_to_disabled
$ensure_disallow_winrm_from_storing_runas_credentials_is_set_to_enabled
$ensure_allow_remote_shell_access_is_set_to_disabled #LEVEL 2
$ensure_configure_automatic_updates_is_set_to_enabled
$ensure_configure_automatic_updates_scheduled_install_day_is_set_to_0_every_day
$ensure_do_not_adjust_default_option_to_install_updates_and_shut_down_in_shut_down_windows_dialog_box_is_set_to_disabled
$ensure_do_not_display_install_updates_and_shut_down_option_in_shut_down_windows_dialog_box_is_set_to_disabled
$ensure_no_auto_restart_with_logged_on_users_for_scheduled_automatic_updates_installations_is_set_to_disabled
$ensure_reschedule_automatic_updates_scheduled_installations_is_set_to_enabled_1_minute
$ensure_enable_screen_saver_is_set_to_enabled
$ensure_force_specific_screen_saver_screen_saver_executable_name_is_set_to_enabled_scrnsavescr
$ensure_password_protect_the_screen_saver_is_set_to_enabled
$ensure_screen_saver_timeout_is_set_to_enabled_900_seconds_or_fewer_but_not_0
$ensure_turn_off_help_experience_improvement_program_is_set_to_enabled # LEVEL 2
$ensure_do_not_preserve_zone_information_in_file_attachments_is_set_to_disabled
$ensure_notify_antivirus_programs_when_opening_attachments_is_set_to_enabled
$ensure_prevent_users_from_sharing_files_within_their_profile_is_set_to_enabled
$ensure_always_install_with_elevated_privileges_is_set_to_disabled_windows_installer
$ensure_prevent_codec_download_is_set_to_enabled #LEVEL 2

Limitations

Development

Future Release:

  • Support more server versions
  • Edit parameters with hiera
  • Add more level 2 features
  • Allow more customization

Contributers

Jack Coleman jack@autostructure.io