| SCM Windows Server 2016 - Domain Controller Baseline | |
| Data collected on: 10/6/2016 10:30:56 AM | |
| Domain | Security.local |
| Owner | SECURITY\Domain Admins |
| Created | 6/22/2016 5:08:50 PM |
| Modified | 10/5/2016 4:04:40 PM |
| User Revisions | 1 (AD), 1 (SYSVOL) |
| Computer Revisions | 58 (AD), 58 (SYSVOL) |
| Unique ID | {9D437703-F551-4E1E-9B4C-E6480DCA6154} |
| GPO Status | User settings disabled |
| Location | Enforced | Link Status | Path |
|---|---|---|---|
| None | |||
| Name |
|---|
| NT AUTHORITY\Authenticated Users |
| Name | Allowed Permissions | Inherited |
|---|---|---|
| NT AUTHORITY\Authenticated Users | Read (from Security Filtering) | No |
| NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS | Read | No |
| NT AUTHORITY\SYSTEM | Edit settings, delete, modify security | No |
| SECURITY\Domain Admins | Edit settings, delete, modify security | No |
| SECURITY\Enterprise Admins | Edit settings, delete, modify security | No |
| Policy | Setting |
|---|---|
| Access Credential Manager as a trusted caller | |
| Access this computer from the network | BUILTIN\Administrators, NT AUTHORITY\Authenticated Users, NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS |
| Act as part of the operating system | |
| Allow log on locally | BUILTIN\Administrators |
| Allow log on through Terminal Services | BUILTIN\Administrators |
| Back up files and directories | BUILTIN\Administrators |
| Create a pagefile | BUILTIN\Administrators |
| Create a token object | |
| Create global objects | BUILTIN\Administrators, NT AUTHORITY\SERVICE, NT AUTHORITY\LOCAL SERVICE, NT AUTHORITY\NETWORK SERVICE |
| Create permanent shared objects | |
| Create symbolic links | BUILTIN\Administrators |
| Debug programs | BUILTIN\Administrators |
| Deny access to this computer from the network | BUILTIN\Guests |
| Deny log on locally | BUILTIN\Guests |
| Deny log on through Terminal Services | BUILTIN\Guests |
| Enable computer and user accounts to be trusted for delegation | BUILTIN\Administrators |
| Force shutdown from a remote system | BUILTIN\Administrators |
| Generate security audits | NT AUTHORITY\LOCAL SERVICE, NT AUTHORITY\NETWORK SERVICE |
| Impersonate a client after authentication | BUILTIN\Administrators, NT AUTHORITY\SERVICE, NT AUTHORITY\LOCAL SERVICE, NT AUTHORITY\NETWORK SERVICE |
| Increase scheduling priority | BUILTIN\Administrators |
| Load and unload device drivers | BUILTIN\Administrators |
| Lock pages in memory | |
| Manage auditing and security log | BUILTIN\Administrators |
| Modify firmware environment values | BUILTIN\Administrators |
| Perform volume maintenance tasks | BUILTIN\Administrators |
| Profile single process | BUILTIN\Administrators |
| Restore files and directories | BUILTIN\Administrators |
| Take ownership of files or other objects | BUILTIN\Administrators |
| Policy | Setting |
|---|---|
| Accounts: Limit local account use of blank passwords to console logon only | Enabled |
| Policy | Setting |
|---|---|
| Domain controller: LDAP server signing requirements | Require signing |
| Domain controller: Refuse machine account password changes | Disabled |
| Policy | Setting |
|---|---|
| Interactive logon: Smart card removal behavior | Lock Workstation |
| Policy | Setting |
|---|---|
| Microsoft network client: Digitally sign communications (always) | Enabled |
| Microsoft network client: Digitally sign communications (if server agrees) | Enabled |
| Microsoft network client: Send unencrypted password to third-party SMB servers | Disabled |
| Policy | Setting |
|---|---|
| Network access: Allow anonymous SID/Name translation | Disabled |
| Network access: Do not allow anonymous enumeration of SAM accounts | Enabled |
| Network access: Do not allow anonymous enumeration of SAM accounts and shares | Enabled |
| Network access: Let Everyone permissions apply to anonymous users | Disabled |
| Network access: Restrict anonymous access to Named Pipes and Shares | Enabled |
| Policy | Setting | ||||
|---|---|---|---|---|---|
| Network security: Do not store LAN Manager hash value on next password change | Enabled | ||||
| Network security: Force logoff when logon hours expire | Enabled | ||||
| Network security: LAN Manager authentication level | Send NTLMv2 response only. Refuse LM & NTLM | ||||
| Network security: LDAP client signing requirements | Negotiate signing | ||||
| Network security: Minimum session security for NTLM SSP based (including secure RPC) clients | Enabled | ||||
| |||||
| Network security: Minimum session security for NTLM SSP based (including secure RPC) servers | Enabled | ||||
| |||||
| Policy | Setting |
|---|---|
| System objects: Require case insensitivity for non-Windows subsystems | Enabled |
| System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) | Enabled |
| Policy | Setting |
|---|---|
| User Account Control: Admin Approval Mode for the Built-in Administrator account | Enabled |
| User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop | Disabled |
| User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode | Prompt for consent on the secure desktop |
| User Account Control: Behavior of the elevation prompt for standard users | Automatically deny elevation requests |
| User Account Control: Detect application installations and prompt for elevation | Enabled |
| User Account Control: Only elevate UIAccess applications that are installed in secure locations | Enabled |
| User Account Control: Run all administrators in Admin Approval Mode | Enabled |
| User Account Control: Virtualize file and registry write failures to per-user locations | Enabled |
| Policy | Setting |
|---|---|
| Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings | Enabled |
| Domain member: Digitally encrypt or sign secure channel data (always) | Enabled |
| Domain member: Digitally encrypt secure channel data (when possible) | Enabled |
| Domain member: Digitally sign secure channel data (when possible) | Enabled |
| Domain member: Disable machine account password changes | Disabled |
| Domain member: Maximum machine account password age | 30 days |
| Domain member: Require strong (Windows 2000 or later) session key | Enabled |
| Interactive logon: Machine inactivity limit | 900 seconds |
| Microsoft network server: Amount of idle time required before suspending session | 15 minutes |
| Microsoft network server: Digitally sign communications (always) | Enabled |
| Microsoft network server: Digitally sign communications (if client agrees) | Enabled |
| Network security: Allow Local System to use computer identity for NTLM | Enabled |
| Network security: Allow LocalSystem NULL session fallback | Disabled |
| Policy | Setting |
|---|---|
| Policy version | 2.26 |
| Disable stateful FTP | Not Configured |
| Disable stateful PPTP | Not Configured |
| IPsec exempt | Not Configured |
| IPsec through NAT | Not Configured |
| Preshared key encoding | Not Configured |
| SA idle time | Not Configured |
| Strong CRL check | Not Configured |
| Policy | Setting |
|---|---|
| Firewall state | On |
| Inbound connections | Block |
| Outbound connections | Allow |
| Apply local firewall rules | Not Configured |
| Apply local connection security rules | Not Configured |
| Display notifications | Not Configured |
| Allow unicast responses | Not Configured |
| Log dropped packets | Not Configured |
| Log successful connections | Not Configured |
| Log file path | Not Configured |
| Log file maximum size (KB) | Not Configured |
| Policy | Setting |
|---|---|
| Firewall state | On |
| Inbound connections | Block |
| Outbound connections | Allow |
| Apply local firewall rules | Not Configured |
| Apply local connection security rules | Not Configured |
| Display notifications | Not Configured |
| Allow unicast responses | Not Configured |
| Log dropped packets | Not Configured |
| Log successful connections | Not Configured |
| Log file path | Not Configured |
| Log file maximum size (KB) | Not Configured |
| Policy | Setting |
|---|---|
| Firewall state | On |
| Inbound connections | Block |
| Outbound connections | Allow |
| Apply local firewall rules | Not Configured |
| Apply local connection security rules | Not Configured |
| Display notifications | Not Configured |
| Allow unicast responses | Not Configured |
| Log dropped packets | Not Configured |
| Log successful connections | Not Configured |
| Log file path | Not Configured |
| Log file maximum size (KB) | Not Configured |
| Policy | Setting |
|---|---|
| Audit Credential Validation | Success, Failure |
| Policy | Setting |
|---|---|
| Audit Computer Account Management | Success |
| Audit Other Account Management Events | Success, Failure |
| Audit Security Group Management | Success, Failure |
| Audit User Account Management | Success, Failure |
| Policy | Setting |
|---|---|
| Audit PNP Activity | Success |
| Audit Process Creation | Success |
| Policy | Setting |
|---|---|
| Audit Directory Service Access | Success, Failure |
| Audit Directory Service Changes | Success, Failure |
| Policy | Setting |
|---|---|
| Audit Account Lockout | Success, Failure |
| Audit Group Membership | Success |
| Audit Logoff | Success |
| Audit Logon | Success, Failure |
| Audit Special Logon | Success |
| Policy | Setting |
|---|---|
| Audit Removable Storage | Success, Failure |
| Policy | Setting |
|---|---|
| Audit Audit Policy Change | Success, Failure |
| Audit Authentication Policy Change | Success |
| Audit Authorization Policy Change | Success |
| Policy | Setting |
|---|---|
| Audit Sensitive Privilege Use | Success, Failure |
| Policy | Setting |
|---|---|
| Audit IPsec Driver | Success, Failure |
| Audit Other System Events | Success, Failure |
| Audit Security State Change | Success |
| Audit Security System Extension | Success, Failure |
| Audit System Integrity | Success, Failure |
| Policy | Setting |
|---|---|
| Enforce rules of this type | True |
| Action | User | Name | Rule Type | Exceptions |
|---|---|---|---|---|
| Allow | Everyone | (Default Rule) All signed packaged apps | Publisher | No |
| Policy | Setting |
|---|---|
| Enforce rules of this type | True |
| Action | User | Name | Rule Type | Exceptions |
|---|---|---|---|---|
| Deny | Everyone | Block Google Chrome | Publisher | No |
| Deny | Everyone | Block Mozilla Firefox | Publisher | No |
| Deny | Everyone | Block Internet Explorer | Publisher | No |
| Allow | Everyone | (Default Rule) All files located in the Program Files folder | Path | No |
| Allow | Everyone | (Default Rule) All files located in the Windows folder | Path | No |
| Allow | BUILTIN\Administrators | (Default Rule) All files | Path | No |
| Policy | Setting | Comment |
|---|---|---|
| Prevent enabling lock screen camera | Enabled | |
| Prevent enabling lock screen slide show | Enabled |
| Policy | Setting | Comment |
|---|---|---|
| WDigest Authentication (disabling may require KB2871997) | Disabled |
| Policy | Setting | Comment | ||
|---|---|---|---|---|
| MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) | Enabled | |||
| ||||
| Policy | Setting | Comment | ||
| MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) | Enabled | |||
| ||||
| Policy | Setting | Comment | ||
| MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes | Disabled | |||
| MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers | Enabled | |||
| Policy | Setting | Comment |
|---|---|---|
| Enable insecure guest logons | Disabled |
| Policy | Setting | Comment |
|---|---|---|
| Windows Firewall: Protect all network connections | Enabled |
| Policy | Setting | Comment | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hardened UNC Paths | Enabled | |||||||||||||||
| ||||||||||||||||
| Policy | Setting | Comment | ||
|---|---|---|---|---|
| Boot-Start Driver Initialization Policy | Enabled | |||
| ||||
| Policy | Setting | Comment | ||||
|---|---|---|---|---|---|---|
| Configure registry policy processing | Enabled | |||||
| ||||||
| Policy | Setting | Comment |
|---|---|---|
| Do not display network selection UI | Enabled |
| Policy | Setting | Comment | ||
|---|---|---|---|---|
| Untrusted Font Blocking | Enabled | |||
| ||||
| Policy | Setting | Comment | ||
|---|---|---|---|---|
| Disallow Autoplay for non-volume devices | Enabled | |||
| Set the default behavior for AutoRun | Enabled | |||
| ||||
| Policy | Setting | Comment | ||
| Turn off Autoplay | Enabled | |||
| ||||
| Policy | Setting | Comment |
|---|---|---|
| Use enhanced anti-spoofing when available | Enabled |
| Policy | Setting | Comment | ||
|---|---|---|---|---|
| Specify the maximum log file size (KB) | Enabled | |||
| ||||
| Policy | Setting | Comment | ||
|---|---|---|---|---|
| Specify the maximum log file size (KB) | Enabled | |||
| ||||
| Policy | Setting | Comment | ||
|---|---|---|---|---|
| Specify the maximum log file size (KB) | Enabled | |||
| ||||
| Policy | Setting | Comment |
|---|---|---|
| Configure Windows SmartScreen | Enabled | |
| Turn off Data Execution Prevention for Explorer | Disabled | |
| Turn off heap termination on corruption | Disabled |
| Policy | Setting | Comment |
|---|---|---|
| Do not allow passwords to be saved | Enabled |
| Policy | Setting | Comment |
|---|---|---|
| Do not allow drive redirection | Enabled |
| Policy | Setting | Comment | ||||
|---|---|---|---|---|---|---|
| Always prompt for password upon connection | Enabled | |||||
| Require secure RPC communication | Enabled | |||||
| Set client connection encryption level | Enabled | |||||
| ||||||
| Policy | Setting | Comment |
|---|---|---|
| Allow indexing of encrypted files | Disabled |
| Policy | Setting | Comment |
|---|---|---|
| Allow user control over installs | Disabled | |
| Always install with elevated privileges | Disabled |
| Policy | Setting | Comment |
|---|---|---|
| Sign-in last interactive user automatically after a system-initiated restart | Disabled |
| Policy | Setting | Comment | ||
|---|---|---|---|---|
| Turn on PowerShell Script Block Logging | Enabled | |||
| ||||
| Policy | Setting | Comment |
|---|---|---|
| Allow Basic authentication | Disabled | |
| Allow unencrypted traffic | Disabled | |
| Disallow Digest authentication | Enabled |
| Policy | Setting | Comment |
|---|---|---|
| Allow Basic authentication | Disabled | |
| Allow unencrypted traffic | Disabled | |
| Disallow WinRM from storing RunAs credentials | Enabled |