百度360必应搜狗淘宝本站头条
当前位置:网站首页 > 技术文章 > 正文

Windows Server 2019 基线检查表 (1)

zhezhongyun 2025-07-23 19:24 45 浏览

Control

Set Correctly

Yes

No

1

Account Policies

1.1

Password Policy

1.1.1

(L1) Ensure 'Enforce password history' is set to '24 or more

password(s)' (Automated)

1.1.2

(L1) Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' (Automated)

1.1.3

(L1) Ensure 'Minimum password age' is set to '1 or more day(s)' (Automated)

1.1.4

(L1) Ensure 'Minimum password length' is set to '14 or more character(s)' (Automated)

1.1.5

(L1) Ensure 'Password must meet complexity requirements' is set to 'Enabled' (Automated)

1.1.6

(L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled' (Automated)

1.2

Account Lockout Policy

1.2.1

(L1) Ensure 'Account lockout duration' is set to '15 or more minute(s)' (Automated)

1.2.2

(L1) Ensure 'Account lockout threshold' is set to '10 or

fewer invalid logon attempt(s), but not 0' (Automated)

1.2.3

(L1) Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)' (Automated)

2

Local Policies

2.1

Audit Policy

2.2

User Rights Assignment

2.2.1

(L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One' (Automated)

2.2.2

(L1) Ensure 'Access this computer from the network' is set

to 'Administrators, Authenticated Users, ENTERPRISE DOMAIN CONTROLLERS' (DC only) (Automated)

2.2.3

(L1) Ensure 'Access this computer from the network' is set

to 'Administrators, Authenticated Users' (MS only) (Automated)

2.2.4

(L1) Ensure 'Act as part of the operating system' is set to 'No One' (Automated)

Control

Set Correctly

Yes

No

2.2.5

(L1) Ensure 'Add workstations to domain' is set to 'Administrators' (DC only) (Automated)

2.2.6

(L1) Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'

(Automated)

2.2.7

(L1) Ensure 'Allow log on locally' is set to 'Administrators'

(Automated)

2.2.8

(L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only) (Automated)

2.2.9

(L1) Ensure 'Allow log on through Remote Desktop Services'

is set to 'Administrators, Remote Desktop Users' (MS only) (Automated)

2.2.10

(L1) Ensure 'Back up files and directories' is set to 'Administrators' (Automated)

2.2.11

(L1) Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE' (Automated)

2.2.12

(L1) Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE' (Automated)

2.2.13

(L1) Ensure 'Create a pagefile' is set to 'Administrators' (Automated)

2.2.14

(L1) Ensure 'Create a token object' is set to 'No One' (Automated)

2.2.15

(L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'

(Automated)

2.2.16

(L1) Ensure 'Create permanent shared objects' is set to 'No One' (Automated)

2.2.17

(L1) Ensure 'Create symbolic links' is set to 'Administrators' (DC only) (Automated)

2.2.18

(L1) Ensure 'Create symbolic links' is set to 'Administrators,

NT VIRTUAL MACHINE\Virtual Machines' (MS only) (Automated)

2.2.19

(L1) Ensure 'Debug programs' is set to 'Administrators' (Automated)

2.2.20

(L1) Ensure 'Deny access to this computer from the

network' to include 'Guests' (DC only) (Automated)

2.2.21

(L1) Ensure 'Deny access to this computer from the

network' to include 'Guests, Local account and member of Administrators group' (MS only) (Automated)

2.2.22

(L1) Ensure 'Deny log on as a batch job' to include 'Guests' (Automated)

Control

Set Correctly

Yes

No

2.2.23

(L1) Ensure 'Deny log on as a service' to include 'Guests' (Automated)

2.2.24

(L1) Ensure 'Deny log on locally' to include 'Guests' (Automated)

2.2.25

(L1) Ensure 'Deny log on through Remote Desktop Services' to include 'Guests' (DC only) (Automated)

2.2.26

(L1) Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account' (MS only) (Automated)

2.2.27

(L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'Administrators' (DC only) (Automated)

2.2.28

(L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only) (Automated)

2.2.29

(L1) Ensure 'Force shutdown from a remote system' is set to

'Administrators' (Automated)

2.2.30

(L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE' (Automated)

2.2.31

(L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only) (Automated)

2.2.32

(L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' and (when the Web Server (IIS) Role with Web Services Role Service is installed) 'IIS_IUSRS' (MS only) (Automated)

2.2.33

(L1) Ensure 'Increase scheduling priority' is set to 'Administrators, Window Manager\Window Manager Group' (Automated)

2.2.34

(L1) Ensure 'Load and unload device drivers' is set to 'Administrators' (Automated)

2.2.35

(L1) Ensure 'Lock pages in memory' is set to 'No One' (Automated)

2.2.36

(L2) Ensure 'Log on as a batch job' is set to 'Administrators' (DC Only) (Automated)

2.2.37

(L1) Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only) (Automated)

2.2.38

(L1) Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only) (Automated)

Control

Set Correctly

Yes

No

2.2.39

(L1) Ensure 'Modify an object label' is set to 'No One' (Automated)

2.2.40

(L1) Ensure 'Modify firmware environment values' is set to 'Administrators' (Automated)

2.2.41

(L1) Ensure 'Perform volume maintenance tasks' is set to 'Administrators' (Automated)

2.2.42

(L1) Ensure 'Profile single process' is set to 'Administrators' (Automated)

2.2.43

(L1) Ensure 'Profile system performance' is set to

'Administrators, NT SERVICE\WdiServiceHost' (Automated)

2.2.44

(L1) Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE' (Automated)

2.2.45

(L1) Ensure 'Restore files and directories' is set to

'Administrators' (Automated)

2.2.46

(L1) Ensure 'Shut down the system' is set to 'Administrators' (Automated)

2.2.47

(L1) Ensure 'Synchronize directory service data' is set to 'No One' (DC only) (Automated)

2.2.48

(L1) Ensure 'Take ownership of files or other objects' is set

to 'Administrators' (Automated)

2.3

Security Options

2.3.1

Accounts

2.3.1.1

(L1) Ensure 'Accounts: Administrator account status' is set to 'Disabled' (MS only) (Automated)

2.3.1.2

(L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'

(Automated)

2.3.1.3

(L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only) (Automated)

2.3.1.4

(L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled' (Automated)

2.3.1.5

(L1) Configure 'Accounts: Rename administrator account' (Automated)

2.3.1.6

(L1) Configure 'Accounts: Rename guest account' (Automated)

2.3.2

Audit

2.3.2.1

(L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled' (Automated)

Control

Set Correctly

Yes

No

2.3.2.2

(L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' (Automated)

2.3.3

DCOM

2.3.4

Devices

2.3.4.1

(L1) Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators' (Automated)

2.3.4.2

(L1) Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled' (Automated)

2.3.5

Domain controller

2.3.5.1

(L1) Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC only) (Automated)

2.3.5.2

(L1) Ensure 'Domain controller: Allow vulnerable Netlogon secure channel connections' is set to 'Not Configured' (DC Only) (Automated)

2.3.5.3

(L1) Ensure 'Domain controller: LDAP server channel

binding token requirements' is set to 'Always' (DC Only) (Automated)

2.3.5.4

(L1) Ensure 'Domain controller: LDAP server signing requirements' is set to 'Require signing' (DC only) (Automated)

2.3.5.5

(L1) Ensure 'Domain controller: Refuse machine account password changes' is set to 'Disabled' (DC only) (Automated)

2.3.6

Domain member

2.3.6.1

(L1) Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled' (Automated)

2.3.6.2

(L1) Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled' (Automated)

2.3.6.3

(L1) Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled' (Automated)

2.3.6.4

(L1) Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled' (Automated)

2.3.6.5

(L1) Ensure 'Domain member: Maximum machine account

password age' is set to '30 or fewer days, but not 0' (Automated)

2.3.6.6

(L1) Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled' (Automated)

2.3.7

Interactive logon

Control

Set Correctly

Yes

No

2.3.7.1

(L1) Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled' (Automated)

2.3.7.2

(L1) Ensure 'Interactive logon: Don't display last signed-in' is set to 'Enabled' (Automated)

2.3.7.3

(L1) Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not 0' (Automated)

2.3.7.4

(L1) Configure 'Interactive logon: Message text for users attempting to log on' (Automated)

2.3.7.5

(L1) Configure 'Interactive logon: Message title for users

attempting to log on' (Automated)

2.3.7.6

(L2) Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to

'4 or fewer logon(s)' (MS only) (Automated)

2.3.7.7

(L1) Ensure 'Interactive logon: Prompt user to change

password before expiration' is set to 'between 5 and 14 days' (Automated)

2.3.7.8

(L1) Ensure 'Interactive logon: Require Domain Controller Authentication to unlock workstation' is set to 'Enabled' (MS

only) (Automated)

2.3.7.9

(L1) Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher (Automated)

2.3.8

Microsoft network client

2.3.8.1

(L1) Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled' (Automated)

2.3.8.2

(L1) Ensure 'Microsoft network client: Digitally sign

communications (if server agrees)' is set to 'Enabled' (Automated)

2.3.8.3

(L1) Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled' (Automated)

2.3.9

Microsoft network server

2.3.9.1

(L1) Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)' (Automated)

2.3.9.2

(L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled' (Automated)

2.3.9.3

(L1) Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'

(Automated)

2.3.9.4

(L1) Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled' (Automated)

Control

Set Correctly

Yes

No

2.3.9.5

(L1) Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or higher (MS only) (Automated)

2.3.10

Network access

2.3.10.1

(L1) Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled' (Automated)

2.3.10.2

(L1) Ensure 'Network access: Do not allow anonymous

enumeration of SAM accounts' is set to 'Enabled' (MS only) (Automated)

2.3.10.3

(L1) Ensure 'Network access: Do not allow anonymous

enumeration of SAM accounts and shares' is set to 'Enabled' (MS only) (Automated)

2.3.10.4

(L2) Ensure 'Network access: Do not allow storage of

passwords and credentials for network authentication' is set to 'Enabled' (Automated)

2.3.10.5

(L1) Ensure 'Network access: Let Everyone permissions

apply to anonymous users' is set to 'Disabled' (Automated)

2.3.10.6

(L1) Configure 'Network access: Named Pipes that can be accessed anonymously' (DC only) (Automated)

2.3.10.7

(L1) Configure 'Network access: Named Pipes that can be accessed anonymously' (MS only) (Automated)

2.3.10.8

(L1) Configure 'Network access: Remotely accessible registry paths' is configured (Automated)

2.3.10.9

(L1) Configure 'Network access: Remotely accessible registry paths and sub-paths' is configured (Automated)

2.3.10.10

(L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' (Automated)

2.3.10.11

(L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only) (Automated)

2.3.10.12

(L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' (Automated)

2.3.10.13

(L1) Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves' (Automated)

2.3.11

Network security

2.3.11.1

(L1) Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to 'Enabled' (Automated)

2.3.11.2

(L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' (Automated)

Control

Set Correctly

Yes

No

2.3.11.3

(L1) Ensure 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' is set to 'Disabled' (Automated)

2.3.11.4

(L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1,

AES256_HMAC_SHA1, Future encryption types' (Automated)

2.3.11.5

(L1) Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled' (Automated)

2.3.11.6

(L1) Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled' (Manual)

2.3.11.7

(L1) Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM &

NTLM' (Automated)

2.3.11.8

(L1) Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher

(Automated)

2.3.11.9

(L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to

'Require NTLMv2 session security, Require 128-bit encryption' (Automated)

2.3.11.10

(L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to

'Require NTLMv2 session security, Require 128-bit encryption' (Automated)

2.3.12

Recovery console

2.3.13

Shutdown

2.3.13.1

(L1) Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled' (Automated)

2.3.14

System cryptography

2.3.15

System objects

2.3.15.1

(L1) Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled' (Automated)

2.3.15.2

(L1) Ensure 'System objects: Strengthen default permissions

of internal system objects (e.g. Symbolic Links)' is set to 'Enabled' (Automated)

2.3.16

System settings

2.3.17

User Account Control

Control

Set Correctly

Yes

No

2.3.17.1

(L1) Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' (Automated)

2.3.17.2

(L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval

Mode' is set to 'Prompt for consent on the secure desktop' (Automated)

2.3.17.3

(L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' (Automated)

2.3.17.4

(L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled' (Automated)

2.3.17.5

(L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled' (Automated)

2.3.17.6

(L1) Ensure 'User Account Control: Run all administrators in

Admin Approval Mode' is set to 'Enabled' (Automated)

2.3.17.7

(L1) Ensure 'User Account Control: Switch to the secure

desktop when prompting for elevation' is set to 'Enabled' (Automated)

2.3.17.8

(L1) Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to

'Enabled' (Automated)

3

Event Log

4

Restricted Groups

5

System Services

6

Registry

7

File System

8

Wired Network (IEEE 802.3) Policies

9

Windows Firewall with Advanced Security

9.1

Domain Profile

9.1.1

(L1) Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)' (Automated)

9.1.2

(L1) Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)' (Automated)

9.1.3

(L1) Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)' (Automated)

9.1.4

(L1) Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No' (Automated)

Control

Set Correctly

Yes

No

9.1.5

(L1) Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\domainfw.log' (Automated)

9.1.6

(L1) Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater' (Automated)

9.1.7

(L1) Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes' (Automated)

9.1.8

(L1) Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes' (Automated)

9.2

Private Profile

9.2.1

(L1) Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)' (Automated)

9.2.2

(L1) Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)' (Automated)

9.2.3

(L1) Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)' (Automated)

9.2.4

(L1) Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No' (Automated)

9.2.5

(L1) Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\privatefw.log'

(Automated)

9.2.6

(L1) Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater' (Automated)

9.2.7

(L1) Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes' (Automated)

9.2.8

(L1) Ensure 'Windows Firewall: Private: Logging: Log

successful connections' is set to 'Yes' (Automated)

9.3

Public Profile

9.3.1

(L1) Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)' (Automated)

9.3.2

(L1) Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)' (Automated)

9.3.3

(L1) Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)' (Automated)

9.3.4

(L1) Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'No' (Automated)

9.3.5

(L1) Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No' (Automated)

Control

Set Correctly

Yes

No

9.3.6

(L1) Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' (Automated)

9.3.7

(L1) Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\publicfw.log'

(Automated)

9.3.8

(L1) Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater' (Automated)

9.3.9

(L1) Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes' (Automated)

9.3.10

(L1) Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes' (Automated)

10

Network List Manager Policies

11

Wireless Network (IEEE 802.11) Policies

12

Public Key Policies

13

Software Restriction Policies

14

Network Access Protection NAP Client Configuration

15

Application Control Policies

16

IP Security Policies

17

Advanced Audit Policy Configuration

17.1

Account Logon

17.1.1

(L1) Ensure 'Audit Credential Validation' is set to 'Success

and Failure' (Automated)

17.1.2

(L1) Ensure 'Audit Kerberos Authentication Service' is set to 'Success and Failure' (DC Only) (Automated)

17.1.3

(L1) Ensure 'Audit Kerberos Service Ticket Operations' is set to 'Success and Failure' (DC Only) (Automated)

17.2

Account Management

17.2.1

(L1) Ensure 'Audit Application Group Management' is set to 'Success and Failure' (Automated)

17.2.2

(L1) Ensure 'Audit Computer Account Management' is set to include 'Success' (DC only) (Automated)

17.2.3

(L1) Ensure 'Audit Distribution Group Management' is set to include 'Success' (DC only) (Automated)

17.2.4

(L1) Ensure 'Audit Other Account Management Events' is set to include 'Success' (DC only) (Automated)

17.2.5

(L1) Ensure 'Audit Security Group Management' is set to include 'Success' (Automated)

17.2.6

(L1) Ensure 'Audit User Account Management' is set to 'Success and Failure' (Automated)

17.3

Detailed Tracking

Control

Set Correctly

Yes

No

17.3.1

(L1) Ensure 'Audit PNP Activity' is set to include 'Success' (Automated)

17.3.2

(L1) Ensure 'Audit Process Creation' is set to include 'Success' (Automated)

17.4

DS Access

17.4.1

(L1) Ensure 'Audit Directory Service Access' is set to include

'Failure' (DC only) (Automated)

17.4.2

(L1) Ensure 'Audit Directory Service Changes' is set to include 'Success' (DC only) (Automated)

17.5

Logon/Logoff

17.5.1

(L1) Ensure 'Audit Account Lockout' is set to include 'Failure' (Automated)

17.5.2

(L1) Ensure 'Audit Group Membership' is set to include

'Success' (Automated)

17.5.3

(L1) Ensure 'Audit Logoff' is set to include 'Success' (Automated)

17.5.4

(L1) Ensure 'Audit Logon' is set to 'Success and Failure'

(Automated)

17.5.5

(L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure' (Automated)

17.5.6

(L1) Ensure 'Audit Special Logon' is set to include 'Success' (Automated)

17.6

Object Access

17.6.1

(L1) Ensure 'Audit Detailed File Share' is set to include

'Failure' (Automated)

17.6.2

(L1) Ensure 'Audit File Share' is set to 'Success and Failure' (Automated)

17.6.3

(L1) Ensure 'Audit Other Object Access Events' is set to

'Success and Failure' (Automated)

17.6.4

(L1) Ensure 'Audit Removable Storage' is set to 'Success and Failure' (Automated)

17.7

Policy Change

17.7.1

(L1) Ensure 'Audit Audit Policy Change' is set to include 'Success' (Automated)

17.7.2

(L1) Ensure 'Audit Authentication Policy Change' is set to

include 'Success' (Automated)

17.7.3

(L1) Ensure 'Audit Authorization Policy Change' is set to include 'Success' (Automated)

17.7.4

(L1) Ensure 'Audit MPSSVC Rule-Level Policy Change' is set

to 'Success and Failure' (Automated)

Control

Set Correctly

Yes

No

17.7.5

(L1) Ensure 'Audit Other Policy Change Events' is set to include 'Failure' (Automated)

17.8

Privilege Use

17.8.1

(L1) Ensure 'Audit Sensitive Privilege Use' is set to 'Success and Failure' (Automated)

17.9

System

17.9.1

(L1) Ensure 'Audit IPsec Driver' is set to 'Success and Failure' (Automated)

17.9.2

(L1) Ensure 'Audit Other System Events' is set to 'Success and Failure' (Automated)

17.9.3

(L1) Ensure 'Audit Security State Change' is set to include 'Success' (Automated)

17.9.4

(L1) Ensure 'Audit Security System Extension' is set to include 'Success' (Automated)

17.9.5

(L1) Ensure 'Audit System Integrity' is set to 'Success and Failure' (Automated)

相关推荐

Python入门学习记录之一:变量_python怎么用变量

写这个,主要是对自己学习python知识的一个总结,也是加深自己的印象。变量(英文:variable),也叫标识符。在python中,变量的命名规则有以下三点:>变量名只能包含字母、数字和下划线...

python变量命名规则——来自小白的总结

python是一个动态编译类编程语言,所以程序在运行前不需要如C语言的先行编译动作,因此也只有在程序运行过程中才能发现程序的问题。基于此,python的变量就有一定的命名规范。python作为当前热门...

Python入门学习教程:第 2 章 变量与数据类型

2.1什么是变量?在编程中,变量就像一个存放数据的容器,它可以存储各种信息,并且这些信息可以被读取和修改。想象一下,变量就如同我们生活中的盒子,你可以把东西放进去,也可以随时拿出来看看,甚至可以换成...

绘制学术论文中的“三线表”具体指导

在科研过程中,大家用到最多的可能就是“三线表”。“三线表”,一般主要由三条横线构成,当然在变量名栏里也可以拆分单元格,出现更多的线。更重要的是,“三线表”也是一种数据记录规范,以“三线表”形式记录的数...

Python基础语法知识--变量和数据类型

学习Python中的变量和数据类型至关重要,因为它们构成了Python编程的基石。以下是帮助您了解Python中的变量和数据类型的分步指南:1.变量:变量在Python中用于存储数据值。它们充...

一文搞懂 Python 中的所有标点符号

反引号`无任何作用。传说Python3中它被移除是因为和单引号字符'太相似。波浪号~(按位取反符号)~被称为取反或补码运算符。它放在我们想要取反的对象前面。如果放在一个整数n...

Python变量类型和运算符_python中变量的含义

别再被小名词坑哭了:Python新手常犯的那些隐蔽错误,我用同事的真实bug拆给你看我记得有一次和同事张姐一起追查一个看似随机崩溃的脚本,最后发现罪魁祸首竟然是她把变量命名成了list。说实话...

从零开始:深入剖析 Spring Boot3 中配置文件的加载顺序

在当今的互联网软件开发领域,SpringBoot无疑是最为热门和广泛应用的框架之一。它以其强大的功能、便捷的开发体验,极大地提升了开发效率,成为众多开发者构建Web应用程序的首选。而在Spr...

Python中下划线 ‘_’ 的用法,你知道几种

Python中下划线()是一个有特殊含义和用途的符号,它可以用来表示以下几种情况:1在解释器中,下划线(_)表示上一个表达式的值,可以用来进行快速计算或测试。例如:>>>2+...

解锁Shell编程:变量_shell $变量

引言:开启Shell编程大门Shell作为用户与Linux内核之间的桥梁,为我们提供了强大的命令行交互方式。它不仅能执行简单的文件操作、进程管理,还能通过编写脚本实现复杂的自动化任务。无论是...

一文学会Python的变量命名规则!_python的变量命名有哪些要求

目录1.变量的命名原则3.内置函数尽量不要做变量4.删除变量和垃圾回收机制5.结语1.变量的命名原则①由英文字母、_(下划线)、或中文开头②变量名称只能由英文字母、数字、下画线或中文字所组成。③英文字...

更可靠的Rust-语法篇-区分语句/表达式,略览if/loop/while/for

src/main.rs://函数定义fnadd(a:i32,b:i32)->i32{a+b//末尾表达式}fnmain(){leta:i3...

C++第五课:变量的命名规则_c++中变量的命名规则

变量的命名不是想怎么起就怎么起的,而是有一套固定的规则的。具体规则:1.名字要合法:变量名必须是由字母、数字或下划线组成。例如:a,a1,a_1。2.开头不能是数字。例如:可以a1,但不能起1a。3....

Rust编程-核心篇-不安全编程_rust安全性

Unsafe的必要性Rust的所有权系统和类型系统为我们提供了强大的安全保障,但在某些情况下,我们需要突破这些限制来:与C代码交互实现底层系统编程优化性能关键代码实现某些编译器无法验证的安全操作Rus...

探秘 Python 内存管理:背后的神奇机制

在编程的世界里,内存管理就如同幕后的精密操控者,确保程序的高效运行。Python作为一种广泛使用的编程语言,其内存管理机制既巧妙又复杂,为开发者们提供了便利的同时,也展现了强大的底层控制能力。一、P...