Vulnerability ID |
Severity |
Message |
V-254247
|
Medium
|
Systems at unsupported servicing levels will not receive security updates for...
|
V-205849
|
High
|
Systems at unsupported servicing levels will not receive security updates for...
|
V-253263
|
High
|
Windows 11 is maintained by Microsoft at servicing levels for specific period...
|
V-220706
|
High
|
Windows 10 is maintained by Microsoft at servicing levels for specific period...
|
V-254355
|
Medium
|
Enumeration of administrator accounts when elevating can provide part of the ...
|
V-205714
|
Medium
|
Enumeration of administrator accounts when elevating can provide part of the ...
|
V-253391
|
Medium
|
Enumeration of administrator accounts when elevating can provide part of the ...
|
V-220832
|
Medium
|
Enumeration of administrator accounts when elevating can provide part of the ...
|
V-205751
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-254289
|
Medium
|
The longer a password is in use, the greater the opportunity for someone to g...
|
V-205659
|
Medium
|
The longer a password is in use, the greater the opportunity for someone to g...
|
V-253301
|
Medium
|
The longer a password is in use, the greater the opportunity for someone to g...
|
V-220743
|
Medium
|
The longer a password is in use, the greater the opportunity for someone to g...
|
V-254447
|
Medium
|
The built-in administrator account is a well-known account subject to attack....
|
V-205909
|
Medium
|
The built-in administrator account is a well-known account subject to attack....
|
V-253435
|
Medium
|
The built-in administrator account is a well-known account subject to attack....
|
V-220911
|
Medium
|
The built-in administrator account is a well-known account subject to attack....
|
V-254291
|
Medium
|
Information systems not protected with strong password schemes (including pas...
|
V-205662
|
Medium
|
Information systems not protected with strong password schemes (including pas...
|
V-253303
|
Medium
|
Information systems not protected with strong password schemes (including pas...
|
V-220745
|
Medium
|
Information systems not protected with strong password schemes (including pas...
|
V-254290
|
Medium
|
Permitting passwords to be changed in immediate succession within the same da...
|
V-205656
|
Medium
|
Permitting passwords to be changed in immediate succession within the same da...
|
V-253302
|
Medium
|
Permitting passwords to be changed in immediate succession within the same da...
|
V-220744
|
Medium
|
Permitting passwords to be changed in immediate succession within the same da...
|
V-253385
|
Low
|
Some features may communicate with the vendor, sending system information or ...
|
V-220826
|
Low
|
Some features may communicate with the vendor, sending system information or ...
|
V-254351
|
Low
|
Some features may communicate with the vendor, sending system information or ...
|
V-205691
|
Low
|
Some features may communicate with the vendor, sending system information or ...
|
V-254448
|
Medium
|
The built-in guest account is a well-known user account on all Windows system...
|
V-205910
|
Medium
|
The built-in guest account is a well-known user account on all Windows system...
|
V-220912
|
Medium
|
The built-in guest account is a well-known user account on all Windows system...
|
V-253436
|
Medium
|
The built-in guest account is a well-known user account on all Windows system...
|
V-254424
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-254438
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-205670
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-205675
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-220971
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-253494
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-254440
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-205748
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-220973
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-253496
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-254426
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-205745
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-205908
|
High
|
An account without a password can allow unauthorized access to a system as on...
|
V-254446
|
High
|
An account without a password can allow unauthorized access to a system as on...
|
V-220910
|
Medium
|
An account without a password can allow unauthorized access to a system as on...
|
V-253434
|
Medium
|
An account without a password can allow unauthorized access to a system as on...
|
V-254429
|
Medium
|
A compromised local administrator account can provide means for an attacker t...
|
V-205715
|
Medium
|
A compromised local administrator account can provide means for an attacker t...
|
V-253357
|
Medium
|
A compromised local administrator account can provide means for an attacker t...
|
V-220799
|
Medium
|
A compromised local administrator account can provide means for an attacker t...
|
V-253432
|
Medium
|
The built-in administrator account is a well-known account subject to attack....
|
V-220908
|
Medium
|
The built-in administrator account is a well-known account subject to attack....
|
V-254445
|
Medium
|
A system faces an increased vulnerability threat if the built-in guest accoun...
|
V-205709
|
Medium
|
A system faces an increased vulnerability threat if the built-in guest accoun...
|
V-253433
|
Medium
|
A system faces an increased vulnerability threat if the built-in guest accoun...
|
V-220909
|
Medium
|
A system faces an increased vulnerability threat if the built-in guest accoun...
|
V-254250
|
High
|
The ability to set access permissions and auditing is critical to maintaining...
|
V-205663
|
High
|
The ability to set access permissions and auditing is critical to maintaining...
|
V-253265
|
High
|
The ability to set access permissions and auditing is critical to maintaining...
|
V-220708
|
High
|
The ability to set access permissions and auditing is critical to maintaining...
|
V-254372
|
Medium
|
Indexing of encrypted files may expose sensitive data. This setting prevents ...
|
V-205694
|
Medium
|
Indexing of encrypted files may expose sensitive data. This setting prevents ...
|
V-253409
|
Medium
|
Indexing of encrypted files may expose sensitive data. This setting prevents ...
|
V-220855
|
Medium
|
Indexing of encrypted files may expose sensitive data. This setting prevents ...
|
V-254494
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-253483
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-220960
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-254317
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-205840
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-253324
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-220766
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-254285
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-205795
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-253297
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-220739
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-254342
|
Medium
|
An exportable version of credentials is provided to remote hosts when using c...
|
V-205863
|
Medium
|
An exportable version of credentials is provided to remote hosts when using c...
|
V-253368
|
Medium
|
An exportable version of credentials is provided to remote hosts when using c...
|
V-220810
|
Medium
|
An exportable version of credentials is provided to remote hosts when using c...
|
V-254376
|
Medium
|
Windows can be configured to automatically sign the user back in after a Wind...
|
V-205925
|
Medium
|
Windows can be configured to automatically sign the user back in after a Wind...
|
V-253413
|
Medium
|
Windows can be configured to automatically sign the user back in after a Wind...
|
V-220859
|
Medium
|
Windows can be configured to automatically sign the user back in after a Wind...
|
V-260469
|
High
|
A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, ca...
|
V-254292
|
Medium
|
The use of complex passwords increases their strength against attack. The bui...
|
V-205652
|
Medium
|
The use of complex passwords increases their strength against attack. The bui...
|
V-253304
|
Medium
|
The use of complex passwords increases their strength against guessing and br...
|
V-260650
|
High
|
Use of weak or untested encryption algorithms undermines the purposes of util...
|
V-220746
|
Medium
|
The use of complex passwords increases their strength against guessing and br...
|
V-254287
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-205630
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-253299
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-220741
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-254257
|
Medium
|
The lack of password protection enables anyone to gain access to the informat...
|
V-205700
|
Medium
|
The lack of password protection enables anyone to gain access to the informat...
|
V-254293
|
High
|
Storing passwords using reversible encryption is essentially the same as stor...
|
V-205653
|
High
|
Storing passwords using reversible encryption is essentially the same as stor...
|
V-253305
|
High
|
Storing passwords using reversible encryption is essentially the same as stor...
|
V-220747
|
High
|
Storing passwords using reversible encryption is essentially the same as stor...
|
V-254453
|
Medium
|
Computer account passwords are changed automatically on a regular basis. Disa...
|
V-205815
|
Medium
|
Computer account passwords are changed automatically on a regular basis. Disa...
|
V-253441
|
Low
|
Computer account passwords are changed automatically on a regular basis. Disa...
|
V-220917
|
Low
|
Computer account passwords are changed automatically on a regular basis. Disa...
|
V-254286
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-205629
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-253298
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-220740
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password atta...
|
V-254483
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-205716
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-254482
|
Medium
|
UAC is a security mechanism for limiting the elevation of privileges, includi...
|
V-205811
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-253468
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-220944
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-254485
|
Medium
|
UAC is a security mechanism for limiting the elevation of privileges, includi...
|
V-205812
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-253471
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-220947
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-254488
|
Medium
|
UAC is a security mechanism for limiting the elevation of privileges, includi...
|
V-205813
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-253474
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-220950
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-254486
|
Medium
|
UAC is a security mechanism for limiting the elevation of privileges, includi...
|
V-205718
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-253472
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-220948
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-254489
|
Medium
|
UAC is a security mechanism for limiting the elevation of privileges, includi...
|
V-205720
|
Medium
|
UAC is a security mechanism for limiting the elevation of privileges, includi...
|
V-253475
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-220951
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-254484
|
Medium
|
UAC is a security mechanism for limiting the elevation of privileges, includi...
|
V-205717
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-253469
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-220945
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-254487
|
Medium
|
UAC is a security mechanism for limiting the elevation of privileges, includi...
|
V-205719
|
Medium
|
UAC is a security mechanism for limiting the elevation of privileges, includi...
|
V-253473
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-220949
|
Medium
|
User Account Control (UAC) is a security mechanism for limiting the elevation...
|
V-254349
|
Medium
|
A system that does not require authentication when resuming from sleep may pr...
|
V-205867
|
Medium
|
A system that does not require authentication when resuming from sleep may pr...
|
V-253380
|
Medium
|
Authentication must always be required when accessing a system. This setting ...
|
V-220821
|
Medium
|
Authentication must always be required when accessing a system. This setting ...
|
V-254350
|
Medium
|
A system that does not require authentication when resuming from sleep may pr...
|
V-205868
|
Medium
|
A system that does not require authentication when resuming from sleep may pr...
|
V-253381
|
Medium
|
Authentication must always be required when accessing a system. This setting ...
|
V-220822
|
Medium
|
Authentication must always be required when accessing a system. This setting ...
|
V-254479
|
Medium
|
If the private key is discovered, an attacker can use the key to authenticate...
|
V-205651
|
Medium
|
If the private key is discovered, an attacker can use the key to authenticate...
|
V-254341
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-205638
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-220809
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-253367
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-254299
|
Medium
|
Protecting audit information also includes identifying and protecting the too...
|
V-205731
|
Medium
|
Protecting audit information also includes identifying and protecting the too...
|
V-254358
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-205796
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-253337
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-220779
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-254359
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-205797
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-253338
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-220780
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-254360
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-205798
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-253339
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-220781
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent a...
|
V-254449
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-205644
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-253437
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-220913
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-254297
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-205641
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-253341
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-220783
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-254298
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-205642
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-253342
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-220784
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-254352
|
High
|
Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
|
V-205804
|
High
|
Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
|
V-253386
|
High
|
Allowing autoplay to execute may introduce malicious code to a system. Autopl...
|
V-220827
|
High
|
Allowing autoplay to execute may introduce malicious code to a system. Autopl...
|
V-254354
|
High
|
Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
|
V-205806
|
High
|
Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
|
V-253388
|
High
|
Allowing autoplay to execute may introduce malicious code to a system. Autopl...
|
V-220829
|
High
|
Allowing autoplay to execute may introduce malicious code to a system. Autopl...
|
V-254353
|
High
|
Allowing AutoRun commands to execute may introduce malicious code to a system...
|
V-205805
|
High
|
Allowing AutoRun commands to execute may introduce malicious code to a system...
|
V-253387
|
High
|
Allowing autorun commands to execute may introduce malicious code to a system...
|
V-220828
|
Medium
|
Allowing autorun commands to execute may introduce malicious code to a system...
|
V-205624
|
Medium
|
If temporary user accounts remain active when no longer needed or for an exce...
|
V-254334
|
Medium
|
When the WDigest Authentication protocol is enabled, plain-text passwords are...
|
V-205687
|
Medium
|
When the WDigest Authentication protocol is enabled, plain-text passwords are...
|
V-253358
|
Medium
|
When the WDigest Authentication protocol is enabled, plain text passwords are...
|
V-220800
|
Medium
|
When the WDigest Authentication protocol is enabled, plain text passwords are...
|
V-254500
|
High
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-205757
|
High
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-253490
|
High
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-220967
|
High
|
Inappropriate granting of user rights can provide system, administrative, and...
|
V-254417
|
Medium
|
WN22-DC-000330
|
V-205876
|
Medium
|
Enabling this setting on all domain controllers in a domain prevents domain m...
|
V-254416
|
Medium
|
Unsigned network traffic is susceptible to man-in-the-middle attacks, where a...
|
V-205820
|
Medium
|
Unsigned network traffic is susceptible to man-in-the-middle attacks, where a...
|
V-254391
|
High
|
Improper access permissions for directory data-related files could allow unau...
|
V-254392
|
High
|
Improper access permissions for directory data files could allow unauthorized...
|
V-205740
|
High
|
Improper access permissions for directory data files could allow unauthorized...
|
V-254427
|
Medium
|
The krbtgt account acts as a service account for the Kerberos Key Distributio...
|
V-205877
|
Medium
|
The krbtgt account acts as a service account for the Kerberos Key Distributio...
|
V-254441
|
High
|
Credential Guard uses virtualization-based security to protect data that coul...
|
V-205907
|
High
|
Credential Guard uses virtualization-based security to protect data that coul...
|
V-253370
|
High
|
Credential Guard uses virtualization-based security to protect information th...
|
V-220812
|
High
|
Credential Guard uses virtualization based security to protect information th...
|
V-253447
|
Low
|
The default Windows configuration caches the last logon credentials for users...
|
V-220923
|
Low
|
The default Windows configuration caches the last logon credentials for users...
|
V-254432
|
Medium
|
The default Windows configuration caches the last logon credentials for users...
|
V-205906
|
Medium
|
The default Windows configuration caches the last logon credentials for users...
|
V-254450
|
Medium
|
Requests sent on the secure channel are authenticated, and sensitive informat...
|
V-205821
|
Medium
|
Requests sent on the secure channel are authenticated, and sensitive informat...
|
V-254451
|
Medium
|
Requests sent on the secure channel are authenticated, and sensitive informat...
|
V-205822
|
Medium
|
Requests sent on the secure channel are authenticated, and sensitive informat...
|
V-254452
|
Medium
|
Requests sent on the secure channel are authenticated, and sensitive informat...
|
V-205823
|
Medium
|
Requests sent on the secure channel are authenticated, and sensitive informat...
|
V-254345
|
Medium
|
Registry entries for group policy settings can potentially be changed from th...
|
V-205866
|
Medium
|
Registry entries for group policy settings can potentially be changed from th...
|
V-253373
|
Medium
|
Enabling this setting and then selecting the "Process even if the Group ...
|
V-220814
|
Medium
|
Enabling this setting and then selecting the "Process even if the Group ...
|
V-254340
|
Medium
|
Additional security requirements are applied to UNC paths specified in harden...
|
V-205862
|
Medium
|
Additional security requirements are applied to UNC paths specified in harden...
|
V-253362
|
Medium
|
Additional security requirements are applied to Universal Naming Convention (...
|
V-250319
|
Medium
|
Additional security requirements are applied to Universal Naming Convention (...
|
V-254430
|
Medium
|
The username is one part of logon credentials that could be used to gain acce...
|
V-205696
|
Medium
|
The username is one part of logon credentials that could be used to gain acce...
|
V-253379
|
Medium
|
The username is one part of logon credentials that could be used to gain acce...
|
V-220820
|
Medium
|
The username is one part of logon credentials that could be used to gain acce...
|
V-254454
|
Medium
|
Computer account passwords are changed automatically on a regular basis. This...
|
V-205911
|
Medium
|
Computer account passwords are changed automatically on a regular basis. This...
|
V-253442
|
Low
|
Computer account passwords are changed automatically on a regular basis. This...
|
V-220918
|
Low
|
Computer account passwords are changed automatically on a regular basis. This...
|
V-254476
|
Medium
|
This setting controls the signing requirements for LDAP clients. This must be...
|
V-205920
|
Medium
|
This setting controls the signing requirements for LDAP clients. This must be...
|
V-253463
|
Medium
|
This setting controls the signing requirements for LDAP clients. This setting...
|
V-220939
|
Medium
|
This setting controls the signing requirements for LDAP clients. This setting...
|
V-253284
|
High
|
Attackers are constantly looking for vulnerabilities in systems and applicati...
|
V-220727
|
High
|
Attackers are constantly looking for vulnerabilities in systems and applicati...
|
V-254364
|
Medium
|
The shell protocol will limit the set of folders that applications can open w...
|
V-205872
|
Medium
|
The shell protocol will limit the set of folders that applications can open w...
|
V-253398
|
Medium
|
The shell protocol will limit the set of folders applications can open when r...
|
V-220839
|
Medium
|
The shell protocol will limit the set of folders applications can open when r...
|
V-254248
|
Medium
|
Malicious software can establish a base on individual desktops and servers. E...
|
V-205850
|
High
|
Malicious software can establish a base on individual desktops and servers. E...
|
V-253264
|
High
|
Malicious software can establish a base on individual desktops and servers. E...
|
V-220707
|
High
|
Malicious software can establish a base on individual desktops and servers. E...
|
V-254346
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-205688
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-253374
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-220815
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-254344
|
Medium
|
Compromised boot drivers can introduce malware prior to protection mechanisms...
|
V-205865
|
Medium
|
Compromised boot drivers can introduce malware prior to protection mechanisms...
|
V-253372
|
Medium
|
The default behavior is for Early Launch Antimalware - Boot-Start Driver Init...
|
V-220813
|
Medium
|
By being launched first by the kernel, ELAM ( Early Launch Antimalware) is en...
|
V-253275
|
High
|
IIS is not installed by default. Installation of Internet Information System ...
|
V-220718
|
High
|
Installation of Internet Information System (IIS) may allow unauthorized inte...
|
V-254456
|
Medium
|
Unattended systems are susceptible to unauthorized use and must be locked whe...
|
V-205633
|
Medium
|
Unattended systems are susceptible to unauthorized use and should be locked w...
|
V-253444
|
Medium
|
Unattended systems are susceptible to unauthorized use and must be locked whe...
|
V-220920
|
Medium
|
Unattended systems are susceptible to unauthorized use and should be locked w...
|
V-254347
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-205689
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-253376
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-220817
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-253382
|
High
|
Remote assistance allows another user to view or take control of the local se...
|
V-220823
|
High
|
Remote assistance allows another user to view or take control of the local se...
|
V-253395
|
Medium
|
Microsoft Defender SmartScreen helps protect systems from programs downloaded...
|
V-220836
|
Medium
|
Windows Defender SmartScreen helps protect systems from programs downloaded f...
|
V-254361
|
Medium
|
Microsoft Defender antivirus SmartScreen helps protect systems from programs ...
|
V-205692
|
Medium
|
Windows Defender SmartScreen helps protect systems from programs downloaded f...
|
V-254333
|
Medium
|
Slide shows that are displayed on the lock screen could display sensitive inf...
|
V-205686
|
Medium
|
Slide shows that are displayed on the lock screen could display sensitive inf...
|
V-254265
|
Medium
|
A firewall provides a line of defense against attack, allowing or blocking in...
|
V-253281
|
Medium
|
A firewall provides a line of defense against attack, allowing or blocking in...
|
V-220724
|
Medium
|
A firewall provides a line of defense against attack, allowing or blocking in...
|
V-214936
|
Medium
|
A firewall provides a line of defense against attack, allowing or blocking in...
|
V-254371
|
Medium
|
Basic authentication uses plain-text passwords that could be used to compromi...
|
V-205693
|
Medium
|
Basic authentication uses plain-text passwords that could be used to compromi...
|
V-253408
|
Medium
|
Basic authentication uses plain text passwords that could be used to compromi...
|
V-220854
|
Medium
|
Basic authentication uses plain text passwords that could be used to compromi...
|
V-223079
|
Medium
|
This policy setting allows you to manage whether Internet Explorer checks for...
|
V-223077
|
Medium
|
This policy setting determines whether Internet Explorer 11 uses 64-bit proce...
|
V-254348
|
Medium
|
Enabling interaction with the network selection UI allows users to change con...
|
V-205690
|
Medium
|
Enabling interaction with the network selection UI allows users to change con...
|
V-253378
|
Medium
|
Enabling interaction with the network selection UI allows users to change con...
|
V-220819
|
Medium
|
Enabling interaction with the network selection UI allows users to change con...
|
V-254370
|
Medium
|
Attachments from RSS feeds may not be secure. This setting will prevent attac...
|
V-205873
|
Medium
|
Attachments from RSS feeds may not be secure. This setting will prevent attac...
|
V-253407
|
Medium
|
Attachments from RSS feeds may not be secure. This setting will prevent attac...
|
V-220853
|
Medium
|
Attachments from RSS feeds may not be secure. This setting will prevent attac...
|
V-254457
|
Medium
|
Failure to display the logon banner prior to a logon attempt will negate lega...
|
V-253445
|
Medium
|
Failure to display the logon banner prior to a logon attempt will negate lega...
|
V-205631
|
Medium
|
Failure to display the logon banner prior to a logon attempt will negate lega...
|
V-220921
|
Medium
|
Failure to display the logon banner prior to a logon attempt will negate lega...
|
V-220844
|
Medium
|
The Windows Defender SmartScreen filter in Microsoft Edge provides warning me...
|
V-220841
|
Medium
|
The Windows Defender SmartScreen filter in Microsoft Edge provides warning me...
|
V-220840
|
Medium
|
The Windows Defender SmartScreen filter in Microsoft Edge provides warning me...
|
V-254466
|
High
|
Anonymous enumeration of SAM accounts allows anonymous logon users (null sess...
|
V-205914
|
High
|
Anonymous enumeration of SAM accounts allows anonymous logon users (null sess...
|
V-253453
|
High
|
Anonymous enumeration of SAM accounts allows anonymous log on users (null ses...
|
V-220929
|
High
|
Anonymous enumeration of SAM accounts allows anonymous log on users (null ses...
|
V-254467
|
High
|
Allowing anonymous logon users (null session connections) to list all account...
|
V-205724
|
High
|
Allowing anonymous logon users (null session connections) to list all account...
|
V-253454
|
High
|
Allowing anonymous logon users (null session connections) to list all account...
|
V-220930
|
High
|
Allowing anonymous logon users (null session connections) to list all account...
|
V-254339
|
Medium
|
Insecure guest logons allow unauthenticated access to shared folders. Shared ...
|
V-205861
|
Medium
|
Insecure guest logons allow unauthenticated access to shared folders. Shared ...
|
V-253360
|
Medium
|
Insecure guest logons allow unauthenticated access to shared folders. Shared ...
|
V-220802
|
Medium
|
Insecure guest logons allow unauthenticated access to shared folders. Shared ...
|
V-254473
|
Medium
|
Certain encryption types are no longer considered secure. The DES and RC4 enc...
|
V-205708
|
Medium
|
Certain encryption types are no longer considered secure. The DES and RC4 enc...
|
V-253460
|
Medium
|
Certain encryption types are no longer considered secure. This setting config...
|
V-220936
|
Medium
|
Certain encryption types are no longer considered secure. This setting config...
|
V-254460
|
Medium
|
The server message block (SMB) protocol provides the basis for many network o...
|
V-205825
|
Medium
|
The server message block (SMB) protocol provides the basis for many network o...
|
V-254475
|
High
|
The Kerberos v5 authentication protocol is the default for authentication of ...
|
V-205919
|
High
|
The Kerberos v5 authentication protocol is the default for authentication of ...
|
V-253462
|
High
|
The Kerberos v5 authentication protocol is the default for authentication of ...
|
V-220938
|
High
|
The Kerberos v5 authentication protocol is the default for authentication of ...
|
V-254461
|
Medium
|
The server message block (SMB) protocol provides the basis for many network o...
|
V-205826
|
Medium
|
The server message block (SMB) protocol provides the basis for many network o...
|
V-254463
|
Medium
|
The server message block (SMB) protocol provides the basis for many network o...
|
V-205827
|
Medium
|
The server message block (SMB) protocol provides the basis for many network o...
|
V-254464
|
Medium
|
The server message block (SMB) protocol provides the basis for many network o...
|
V-205828
|
Medium
|
The server message block (SMB) protocol provides the basis for many network o...
|
V-254468
|
Medium
|
Access by anonymous users must be restricted. If this setting is enabled, ano...
|
V-205915
|
Medium
|
Access by anonymous users must be restricted. If this setting is enabled, ano...
|
V-253455
|
Medium
|
Access by anonymous users must be restricted. If this setting is enabled, the...
|
V-220937
|
High
|
The LAN Manager hash uses a weak encryption algorithm and there are several t...
|
V-254277
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
|
V-205684
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
|
V-253288
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
|
V-220731
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
|
V-254276
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
|
V-205683
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
|
V-253287
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
|
V-220730
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
|
V-254471
|
Medium
|
NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
|
V-205917
|
Medium
|
NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
|
V-253458
|
Medium
|
NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
|
V-220934
|
Medium
|
NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
|
V-254469
|
High
|
Allowing anonymous access to named pipes or shares provides the potential for...
|
V-205725
|
High
|
Allowing anonymous access to named pipes or shares provides the potential for...
|
V-253456
|
High
|
Allowing anonymous access to named pipes or shares provides the potential for...
|
V-220932
|
High
|
Allowing anonymous access to named pipes or shares provides the potential for...
|
V-254433
|
Medium
|
The Windows SAM stores users' passwords. Restricting Remote Procedure Call (R...
|
V-205747
|
Medium
|
The Windows SAM stores users' passwords. Restricting Remote Procedure Call (R...
|
V-253457
|
Medium
|
The Windows SAM stores users' passwords. Restricting remote rpc connections t...
|
V-220933
|
Medium
|
The Windows SAM stores users' passwords. Restricting remote rpc connections t...
|
V-254470
|
Medium
|
Services using Local System that use Negotiate when reverting to NTLM authent...
|
V-205916
|
Medium
|
Services using Local System that use Negotiate when reverting to NTLM authent...
|
V-254477
|
Medium
|
Microsoft has implemented a variety of security support providers for use wit...
|
V-205921
|
Medium
|
Microsoft has implemented a variety of security support providers for use wit...
|
V-254478
|
Medium
|
Microsoft has implemented a variety of security support providers for use wit...
|
V-205922
|
Medium
|
Microsoft has implemented a variety of security support providers for use wit...
|
V-254462
|
Medium
|
Some non-Microsoft SMB servers only support unencrypted (plain-text) password...
|
V-205655
|
Medium
|
Some non-Microsoft SMB servers only support unencrypted (plain-text) password...
|
V-253450
|
Medium
|
Some non-Microsoft SMB servers only support unencrypted (plain text) password...
|
V-220926
|
Medium
|
Some non-Microsoft SMB servers only support unencrypted (plain text) password...
|
V-254275
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
|
V-205682
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
|
V-254335
|
Low
|
Configuring the system to disable IPv6 source routing protects against spoofing.
|
V-205858
|
Low
|
Configuring the system to disable IPv6 source routing protects against spoofing.
|
V-253353
|
Medium
|
Configuring the system to disable IPv6 source routing protects against spoofing.
|
V-220795
|
Medium
|
Configuring the system to disable IPv6 source routing protects against spoofing.
|
V-254272
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-205680
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-253277
|
Medium
|
"Simple TCP/IP Services" is not installed by default. Some protocols and serv...
|
V-220720
|
Medium
|
Some protocols and services do not support required security features, such a...
|
V-254336
|
Low
|
Configuring the system to disable IP source routing protects against spoofing.
|
V-205859
|
Low
|
Configuring the system to disable IP source routing protects against spoofing.
|
V-254288
|
Medium
|
A system is more vulnerable to unauthorized access when system users recycle ...
|
V-205660
|
Medium
|
A system is more vulnerable to unauthorized access when system users recycle ...
|
V-253300
|
Medium
|
A system is more vulnerable to unauthorized access when system users recycle ...
|
V-220742
|
Medium
|
A system is more vulnerable to unauthorized access when system users recycle ...
|
V-254258
|
Medium
|
Passwords that do not expire or are reused increase the exposure of a passwor...
|
V-205658
|
Medium
|
Passwords that do not expire or are reused increase the exposure of a passwor...
|
V-253273
|
Medium
|
Passwords that do not expire increase exposure with a greater probability of ...
|
V-220716
|
Medium
|
Passwords that do not expire increase exposure with a greater probability of ...
|
V-254474
|
High
|
The LAN Manager hash uses a weak encryption algorithm and there are several t...
|
V-205654
|
High
|
The LAN Manager hash uses a weak encryption algorithm and there are several t...
|
V-253461
|
High
|
The LAN Manager hash uses a weak encryption algorithm and there are several t...
|
V-254377
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-205639
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-253414
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-220860
|
Medium
|
Maintaining an audit trail of system activity logs can help identify configur...
|
V-254278
|
Medium
|
Windows PowerShell 5.x added advanced logging features that can provide addit...
|
V-205685
|
Medium
|
Windows PowerShell 5.x added advanced logging features that can provide addit...
|
V-253285
|
Medium
|
Windows PowerShell 5.0 added advanced logging features which can provide addi...
|
V-220728
|
Medium
|
Windows PowerShell 5.0 added advanced logging features which can provide addi...
|
V-205869
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-253393
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-220834
|
Medium
|
Some features may communicate with the vendor, sending system information or ...
|
V-254367
|
Medium
|
This setting controls the ability of users to supply passwords automatically ...
|
V-205809
|
Medium
|
This setting controls the ability of users to supply passwords automatically ...
|
V-253404
|
Medium
|
This setting controls the ability of users to supply passwords automatically ...
|
V-220850
|
Medium
|
This setting controls the ability of users to supply passwords automatically ...
|
V-254369
|
Medium
|
Remote connections must be encrypted to prevent interception of data or sensi...
|
V-205637
|
Medium
|
Remote connections must be encrypted to prevent interception of data or sensi...
|
V-253406
|
Medium
|
Remote connections must be encrypted to prevent interception of data or sensi...
|
V-220852
|
Medium
|
Remote connections must be encrypted to prevent interception of data or sensi...
|
V-260469
|
High
|
A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, ...
|
V-260470
|
High
|
To mitigate the risk of unauthorized access to sensitive information by ent...
|
V-260471
|
Medium
|
If auditing is enabled late in the startup process, the actions of some sta...
|
V-260472
|
Low
|
Restricting access to the kernel message buffer limits access only to root....
|
V-260473
|
Medium
|
Kernel core dumps may contain the full contents of system memory at the tim...
|
V-260474
|
Medium
|
Some adversaries launch attacks with the intent of executing code in nonexe...
|
V-260475
|
Medium
|
Some adversaries launch attacks with the intent of executing code in nonexe...
|
V-260476
|
Low
|
Changes to any software components can have significant effects on the over...
|
V-260477
|
Medium
|
Previous versions of software components that are not removed from the info...
|
V-260478
|
Medium
|
Use of a complex password helps to increase the time and resources required...
|
V-260479
|
Low
|
Inaccurate time stamps make it more difficult to correlate events and can l...
|
V-260480
|
Low
|
Inaccurate time stamps make it more difficult to correlate events and can l...
|
V-260481
|
Low
|
Inaccurate time stamps make it more difficult to correlate events and can l...
|
V-260482
|
High
|
It is detrimental for operating systems to provide, or install by default, ...
|
V-260483
|
High
|
It is detrimental for operating systems to provide, or install by default, ...
|
V-260484
|
Medium
|
Operating systems handling data requiring "data at rest" protections must e...
|
V-260485
|
Medium
|
Protecting audit information also includes identifying and protecting the t...
|
V-260486
|
Medium
|
If Ubuntu 22.04 LTS were to allow any user to make changes to software libr...
|
V-260487
|
Medium
|
If the operating system were to allow any user to make changes to software ...
|
V-260488
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260489
|
Medium
|
Any operating system providing too much information in error messages risks...
|
V-260490
|
Medium
|
Any operating system providing too much information in error messages risks...
|
V-260491
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260492
|
Medium
|
Protecting audit information also includes identifying and protecting the t...
|
V-260493
|
Medium
|
Protecting audit information also includes identifying and protecting the t...
|
V-260494
|
Medium
|
Protecting audit information also includes identifying and protecting the t...
|
V-260495
|
Medium
|
If Ubuntu 22.04 LTS were to allow any user to make changes to software libr...
|
V-260496
|
Medium
|
If Ubuntu 22.04 LTS were to allow any user to make changes to software libr...
|
V-260497
|
Medium
|
If the operating system were to allow any user to make changes to software ...
|
V-260498
|
Medium
|
If the operating system were to allow any user to make changes to software ...
|
V-260499
|
Medium
|
If the operating system were to allow any user to make changes to software ...
|
V-260500
|
Medium
|
If the operating system were to allow any user to make changes to software ...
|
V-260501
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260502
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260503
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260504
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260505
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260506
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260507
|
Medium
|
Protecting audit information also includes identifying and protecting the t...
|
V-260508
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260509
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260510
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260511
|
Medium
|
Only authorized personnel should be aware of errors and the details of the ...
|
V-260512
|
Medium
|
Any operating system providing too much information in error messages risks...
|
V-260513
|
Medium
|
Preventing unauthorized information transfers mitigates the risk of informa...
|
V-260514
|
Medium
|
Remote access services, such as those providing remote access to network de...
|
V-260515
|
Medium
|
Remote access services, such as those providing remote access to network de...
|
V-260516
|
Medium
|
Firewalls protect computers from network attacks by blocking or limiting ac...
|
V-260517
|
Medium
|
Denial of service (DoS) is a condition when a resource is not available for...
|
V-260518
|
Medium
|
To prevent unauthorized connection of devices, unauthorized transfer of inf...
|
V-260519
|
Low
|
Inaccurate time stamps make it more difficult to correlate events and can l...
|
V-260520
|
Low
|
Inaccurate time stamps make it more difficult to correlate events and can l...
|
V-260521
|
Low
|
If time stamps are not consistently applied and there is no common time ref...
|
V-260522
|
Medium
|
DoS is a condition when a resource is not available for legitimate users. W...
|
V-260523
|
High
|
Without protection of the transmitted information, confidentiality and inte...
|
V-260524
|
High
|
Without protection of the transmitted information, confidentiality and inte...
|
V-260533
|
Medium
|
Without cryptographic integrity protections provided by FIPS-validated cryp...
|
V-260534
|
Medium
|
Nonlocal maintenance and diagnostic activities are those activities conduct...
|
V-260537
|
Medium
|
A session lock is a temporary action taken when a user stops work and moves...
|
V-260538
|
Medium
|
A session lock is a temporary action taken when a user stops work and moves...
|
V-260539
|
High
|
A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, ...
|
V-260540
|
Medium
|
Without authenticating devices, unidentified or unknown devices may be intr...
|
V-260541
|
Medium
|
Without protection of communications with wireless peripherals, confidentia...
|
V-260542
|
Medium
|
To ensure individual accountability and prevent unauthorized access, organi...
|
V-260543
|
Medium
|
To ensure accountability and prevent unauthenticated access, organizational...
|
V-260545
|
Medium
|
Enforcing a minimum password lifetime helps to prevent repeated password ch...
|
V-260546
|
Medium
|
Any password, no matter how complex, can eventually be cracked. Therefore, ...
|
V-260547
|
Medium
|
Inactive identifiers pose a risk to systems and applications because attack...
|
V-260535
|
Medium
|
Display of a standardized and approved use notification before granting acc...
|
V-260548
|
Medium
|
Temporary accounts are privileged or nonprivileged accounts established dur...
|
V-260549
|
Low
|
By limiting the number of failed logon attempts, the risk of unauthorized s...
|
V-260550
|
Low
|
Limiting the number of logon attempts over a certain time interval reduces ...
|
V-260552
|
Low
|
Ubuntu 22.04 LTS management includes the ability to control the number of u...
|
V-260553
|
Medium
|
A session lock is a temporary action taken when a user stops work and moves...
|
V-260554
|
Medium
|
Terminating an idle interactive command shell user session within a short t...
|
V-260535
|
Medium
|
Display of a standardized and approved use notification before granting acc...
|
V-260536
|
Medium
|
Display of a standardized and approved use notification before granting acc...
|
V-260555
|
Medium
|
Setting the most restrictive default permissions ensures newly created acco...
|
V-260556
|
Medium
|
Control of program execution is a mechanism used to prevent execution of un...
|
V-260557
|
Medium
|
Control of program execution is a mechanism used to prevent execution of un...
|
V-260558
|
Medium
|
Without reauthentication, users may access resources or perform tasks for w...
|
V-260559
|
High
|
An isolation boundary provides access control and protects the integrity of...
|
V-260560
|
Medium
|
Use of a complex password helps to increase the time and resources required...
|
V-260561
|
Medium
|
Use of a complex password helps to increase the time and resources required...
|
V-260562
|
Medium
|
Use of a complex password helps to increase the time and resources required...
|
V-260563
|
Medium
|
Use of a complex password helps to increase the time and resources required...
|
V-260564
|
Medium
|
If Ubuntu 22.04 LTS allows the user to select passwords based on dictionary...
|
V-260565
|
Medium
|
The shorter the password, the lower the number of possible combinations tha...
|
V-260566
|
Medium
|
If the operating system allows the user to consecutively reuse extensive po...
|
V-260567
|
Medium
|
Use of a complex password helps to increase the time and resources required...
|
V-260569
|
Medium
|
Password complexity, or strength, is a measure of the effectiveness of a pa...
|
V-260570
|
High
|
If an account has an empty password, anyone could log on and run commands w...
|
V-260571
|
High
|
If an account has an empty password, anyone could log on and run commands w...
|
V-260572
|
Medium
|
Passwords need to be protected at all times, and encryption is the standard...
|
V-260573
|
Medium
|
Using an authentication device, such as a CAC or token separate from the in...
|
V-260574
|
Medium
|
The use of PIV credentials facilitates standardization and reduces the risk...
|
V-260575
|
Medium
|
Without the use of multifactor authentication, the ease of access to privil...
|
V-260576
|
Medium
|
The use of PIV credentials facilitates standardization and reduces the risk...
|
V-260577
|
Medium
|
Without path validation, an informed trust decision by the relying party ca...
|
V-260578
|
Medium
|
Without configuring a local cache of revocation data, there is the potentia...
|
V-260579
|
High
|
Without mapping the certificate used to authenticate to the user account, t...
|
V-260580
|
Medium
|
Untrusted certificate authorities (CA) can issue certificates, but they may...
|
V-260581
|
Low
|
If cached authentication information is out-of-date, the validity of the au...
|
V-260582
|
Medium
|
Without verification of the security functions, security functions may not ...
|
V-260583
|
Medium
|
Without verification of the security functions, security functions may not ...
|
V-260584
|
Medium
|
Unauthorized changes to the baseline configuration could make the system vu...
|
V-260585
|
Medium
|
Without verification of the security functions, security functions may not ...
|
V-260586
|
Medium
|
Protecting the integrity of the tools used for auditing purposes is a criti...
|
V-260587
|
Low
|
Information stored in one location is vulnerable to accidental or incidenta...
|
V-260588
|
Medium
|
Failure to a known state can address safety or security in accordance with ...
|
V-260589
|
Medium
|
Remote access services, such as those providing remote access to network de...
|
V-260590
|
Medium
|
Without establishing the when, where, type, source, and outcome of events t...
|
V-260591
|
Medium
|
Without establishing the when, where, type, source, and outcome of events t...
|
V-260592
|
Low
|
Information stored in one location is vulnerable to accidental or incidenta...
|
V-260593
|
Low
|
It is critical for the appropriate personnel to be aware if a system is at ...
|
V-260594
|
Medium
|
It is critical that when the operating system is at risk of failing to proc...
|
V-260595
|
Low
|
To ensure operating systems have a sufficient storage capacity in which to ...
|
V-260596
|
Low
|
If security personnel are not notified immediately when storage volume reac...
|
V-260597
|
Medium
|
Unauthorized disclosure of audit records can reveal system and configuratio...
|
V-260598
|
Medium
|
Unauthorized disclosure of audit records can reveal system and configuratio...
|
V-260599
|
Medium
|
Unauthorized disclosure of audit records can reveal system and configuratio...
|
V-260600
|
Medium
|
If audit information were to become compromised, then forensic analysis and...
|
V-260601
|
Medium
|
Without the capability to restrict which roles and individuals can select w...
|
V-260602
|
Medium
|
Without the capability to restrict which roles and individuals can select w...
|
V-260603
|
Medium
|
Without the capability to restrict which roles and individuals can select w...
|
V-260604
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260605
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260606
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260607
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260608
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260609
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260610
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260611
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260612
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260613
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260613
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260614
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260615
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260616
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260617
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260618
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260619
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260620
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260621
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260622
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260623
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260624
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260625
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260626
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260627
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260628
|
Medium
|
Once an attacker establishes access to a system, the attacker often attempt...
|
V-260629
|
Medium
|
Once an attacker establishes access to a system, the attacker often attempt...
|
V-260630
|
Medium
|
Once an attacker establishes access to a system, the attacker often attempt...
|
V-260631
|
Medium
|
Once an attacker establishes access to a system, the attacker often attempt...
|
V-260632
|
Medium
|
Once an attacker establishes access to a system, the attacker often attempt...
|
V-260633
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260634
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260635
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260636
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260637
|
Medium
|
Without generating audit records that are specific to the security and miss...
|
V-260638
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260639
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260640
|
Medium
|
Once an attacker establishes access to a system, the attacker often attempt...
|
V-260641
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260642
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260643
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260644
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260645
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260646
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260647
|
Medium
|
Without generating audit records specific to the security and mission needs...
|
V-260648
|
Medium
|
In certain situations, software applications/programs need to execute with ...
|
V-260649
|
Medium
|
If events associated with nonlocal administrative access or diagnostic sess...
|
V-260650
|
High
|
Use of weak or untested encryption algorithms undermines the purposes of ut...
|
V-224819
|
High
|
Using a privileged account to perform routine functions makes the computer ...
|
V-254365
|
Medium
|
Saving passwords in the Remote Desktop Client could allow an unauthorized use...
|
V-205808
|
Medium
|
Saving passwords in the Remote Desktop Client could allow an unauthorized use...
|
V-253402
|
Medium
|
Saving passwords in the Remote Desktop Client could allow an unauthorized use...
|
V-220848
|
Medium
|
Saving passwords in the Remote Desktop Client could allow an unauthorized use...
|
V-254366
|
Medium
|
Preventing users from sharing the local drives on their client computers with...
|
V-205722
|
Medium
|
Preventing users from sharing the local drives on their client computers with...
|
V-224820
|
Medium
|
The longer a password is in use, the greater the opportunity for someone to...
|
V-224821
|
High
|
Using applications that access the Internet or have potential Internet sour...
|
V-224822
|
Medium
|
Backup Operators are able to read and write to any file in the system, rega...
|
V-224823
|
Medium
|
Application/service account passwords must be of sufficient length to preve...
|
V-224824
|
Medium
|
Setting application account passwords to expire may cause applications to s...
|
V-224825
|
Medium
|
Shared accounts (accounts where two or more people log on with the same use...
|
V-224826
|
Medium
|
Using an allowlist provides a configuration management method to allow the ...
|
V-224827
|
Medium
|
Credential Guard uses virtualization-based security to protect data that co...
|
V-224828
|
High
|
Systems at unsupported servicing levels will not receive security updates f...
|
V-224829
|
High
|
Malicious software can establish a base on individual desktops and servers....
|
V-224830
|
Medium
|
A properly configured Host-based Intrusion Detection System (HIDS) or Host-...
|
V-224831
|
High
|
The ability to set access permissions and auditing is critical to maintaini...
|
V-224832
|
Medium
|
Changing the system's file and directory permissions allows the possibility...
|
V-224833
|
Medium
|
Changing the system's file and directory permissions allows the possibility...
|
V-224834
|
Medium
|
Changing the system's file and directory permissions allows the possibility...
|
V-224835
|
Medium
|
The registry is integral to the function, security, and stability of the Wi...
|
V-224836
|
Low
|
Windows shares are a means by which files, folders, printers, and other res...
|
V-224837
|
Medium
|
Outdated or unused accounts provide penetration points that may go undetect...
|
V-224838
|
Medium
|
The lack of password protection enables anyone to gain access to the inform...
|
V-224839
|
Medium
|
Passwords that do not expire or are reused increase the exposure of a passw...
|
V-224840
|
Medium
|
Monitoring system files for changes against a baseline on a regular basis m...
|
V-224841
|
Medium
|
Shares on a system provide network access. To prevent exposing sensitive in...
|
V-254368
|
Medium
|
Allowing unsecure RPC communication exposes the system to man-in-the-middle a...
|
V-205636
|
Medium
|
Allowing unsecure RPC communication exposes the system to man-in-the-middle a...
|
V-254431
|
Medium
|
Unauthenticated RPC clients may allow anonymous access to sensitive informati...
|
V-205814
|
Medium
|
Unauthenticated RPC clients may allow anonymous access to sensitive informati...
|
V-253383
|
Medium
|
Configuring RPC to restrict unauthenticated RPC clients from connecting to th...
|
V-220824
|
Medium
|
Configuring RPC to restrict unauthenticated RPC clients from connecting to th...
|
V-254379
|
Medium
|
Unencrypted remote access to a system can allow sensitive information to be c...
|
V-205816
|
Medium
|
Unencrypted remote access to a system can allow sensitive information to be c...
|
V-253417
|
Medium
|
Unencrypted remote access to a system can allow sensitive information to be c...
|
V-220863
|
Medium
|
Unencrypted remote access to a system can allow sensitive information to be c...
|
V-224842
|
Medium
|
Use of software certificates and their accompanying installation files for ...
|
V-224843
|
High
|
This requirement addresses protection of user-generated data as well as ope...
|
V-224844
|
Medium
|
Information can be either unintentionally or maliciously disclosed or modif...
|
V-224845
|
Medium
|
Unnecessary roles and features increase the attack surface of a system. Lim...
|
V-224846
|
Medium
|
A firewall provides a line of defense against attack, allowing or blocking ...
|
V-224847
|
Medium
|
Without the use of automated mechanisms to scan for security flaws on a con...
|
V-224848
|
Medium
|
If temporary user accounts remain active when no longer needed or for an ex...
|
V-224849
|
Medium
|
Emergency administrator accounts are privileged accounts established in res...
|
V-224850
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these...
|
V-224851
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these...
|
V-224852
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these...
|
V-224853
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these...
|
V-224854
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these...
|
V-224855
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these...
|
V-224856
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 ...
|
V-224857
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 ...
|
V-224858
|
Medium
|
SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 ...
|
V-224859
|
Medium
|
Windows PowerShell 5.0 added advanced logging features that can provide add...
|
V-224860
|
Medium
|
The FTP service allows remote users to access shared files and directories....
|
V-224861
|
Medium
|
The FTP service allows remote users to access shared files and directories ...
|
V-224862
|
Low
|
The Windows Time Service controls time synchronization settings. Time synch...
|
V-224863
|
Medium
|
Accounts or groups given rights on a system may show up as unresolved SIDs ...
|
V-224864
|
Low
|
Secure Boot is a standard that ensures systems boot only to a trusted opera...
|
V-224865
|
Low
|
UEFI provides additional security features in comparison to legacy BIOS fir...
|
V-224866
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password at...
|
V-254378
|
High
|
Basic authentication uses plain-text passwords that could be used to compro...
|
V-205711
|
High
|
Basic authentication uses plain-text passwords that could be used to compro...
|
V-253416
|
High
|
Basic authentication uses plain text passwords that could be used to compromi...
|
V-220862
|
High
|
Basic authentication uses plain text passwords that could be used to compromi...
|
V-254380
|
Medium
|
Digest authentication is not as strong as other options and may be subject to...
|
V-205712
|
Medium
|
Digest authentication is not as strong as other options and may be subject to...
|
V-253421
|
Medium
|
Digest authentication is not as strong as other options and may be subject to...
|
V-220868
|
Medium
|
Digest authentication is not as strong as other options and may be subject to...
|
V-254381
|
High
|
Basic authentication uses plain-text passwords that could be used to compromi...
|
V-205713
|
High
|
Basic authentication uses plain-text passwords that could be used to compromi...
|
V-253418
|
High
|
Basic authentication uses plain text passwords that could be used to compromi...
|
V-220865
|
High
|
Basic authentication uses plain text passwords that could be used to compromi...
|
V-253426
|
Medium
|
Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (D...
|
V-220902
|
Medium
|
Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (D...
|
V-224867
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password at...
|
V-224868
|
Medium
|
The account lockout feature, when enabled, prevents brute-force password at...
|
V-224869
|
Medium
|
A system is more vulnerable to unauthorized access when system users recycl...
|
V-224870
|
Medium
|
The longer a password is in use, the greater the opportunity for someone to...
|
V-224871
|
Medium
|
Permitting passwords to be changed in immediate succession within the same ...
|
V-224872
|
Medium
|
Information systems not protected with strong password schemes (including p...
|
V-224873
|
Medium
|
The use of complex passwords increases their strength against attack. The b...
|
V-224874
|
High
|
Storing passwords using reversible encryption is essentially the same as st...
|
V-224875
|
Medium
|
Protection of log data includes assuring the log data is not accidentally l...
|
V-224876
|
Medium
|
Protection of log data includes ensuring the log data is not accidentally l...
|
V-224877
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224878
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224879
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-218822
|
Medium
|
Vulnerability Discussion
TLS is a required transmission protocol for a web s...
|
V-218821
|
Medium
|
TLS encryption is a required security setting for a private web server. Encry...
|
V-254263
|
Medium
|
Information can be either unintentionally or maliciously disclosed or modifie...
|
V-205829
|
Medium
|
Information can be either unintentionally or maliciously disclosed or modifie...
|
V-254343
|
Medium
|
Virtualization Based Security (VBS) provides the platform for the additional ...
|
V-205864
|
Medium
|
Virtualization-based security (VBS) provides the platform for the additional ...
|
V-253369
|
Medium
|
Virtualization-based Security (VBS) provides the platform for the additional ...
|
V-220811
|
Medium
|
Virtualization Based Security (VBS) provides the platform for the additional ...
|
V-254374
|
High
|
Standard user accounts must not be granted elevated privileges. Enabling Wind...
|
V-205802
|
High
|
Standard user accounts must not be granted elevated privileges. Enabling Wind...
|
V-253411
|
High
|
Standard user accounts must not be granted elevated privileges. Enabling Wind...
|
V-220857
|
High
|
Standard user accounts must not be granted elevated privileges. Enabling Wind...
|
V-224880
|
Medium
|
Protecting audit information also includes identifying and protecting the t...
|
V-224881
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224882
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224883
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224884
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224885
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224886
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224887
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224888
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224890
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224891
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224892
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224893
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224894
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224895
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224896
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224897
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224898
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224899
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224900
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224901
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224902
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224903
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224904
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224905
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224906
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224907
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224908
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224909
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224910
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224911
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224912
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224913
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224914
|
Medium
|
Slide shows that are displayed on the lock screen could display sensitive i...
|
V-224915
|
Medium
|
When the WDigest Authentication protocol is enabled, plain-text passwords a...
|
V-224916
|
Low
|
Configuring the system to disable IPv6 source routing protects against spoo...
|
V-224917
|
Low
|
Configuring the system to disable IP source routing protects against spoofing.
|
V-224918
|
Low
|
Allowing ICMP redirect of routes can lead to traffic not being routed prope...
|
V-224919
|
Low
|
Configuring the system to ignore name release requests, except from WINS se...
|
V-224920
|
Medium
|
Insecure guest logons allow unauthenticated access to shared folders. Share...
|
V-224921
|
Medium
|
Additional security requirements are applied to Universal Naming Convention...
|
V-224922
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224923
|
Medium
|
Virtualization-based security (VBS) provides the platform for the additiona...
|
V-224924
|
Medium
|
Compromised boot drivers can introduce malware prior to protection mechanis...
|
V-224925
|
Medium
|
Registry entries for group policy settings can potentially be changed from ...
|
V-224926
|
Medium
|
Some features may communicate with the vendor, sending system information o...
|
V-224927
|
Medium
|
Some features may communicate with the vendor, sending system information o...
|
V-224928
|
Medium
|
Enabling interaction with the network selection UI allows users to change c...
|
V-224929
|
Medium
|
A system that does not require authentication when resuming from sleep may ...
|
V-224930
|
Medium
|
A system that does not require authentication when resuming from sleep may ...
|
V-224931
|
Low
|
Some features may communicate with the vendor, sending system information o...
|
V-224932
|
High
|
Allowing AutoPlay to execute may introduce malicious code to a system. Auto...
|
V-224933
|
High
|
Allowing AutoRun commands to execute may introduce malicious code to a syst...
|
V-224934
|
High
|
Allowing AutoPlay to execute may introduce malicious code to a system. Auto...
|
V-224935
|
Medium
|
Enumeration of administrator accounts when elevating can provide part of th...
|
V-224936
|
Medium
|
Some features may communicate with the vendor, sending system information o...
|
V-224937
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent...
|
V-224938
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent...
|
V-224939
|
Medium
|
Inadequate log size will cause the log to fill up quickly. This may prevent...
|
V-224940
|
Medium
|
Windows SmartScreen helps protect systems from programs downloaded from the...
|
V-224941
|
Medium
|
Data Execution Prevention provides additional protection by performing chec...
|
V-224942
|
Low
|
Legacy plug-in applications may continue to function when a File Explorer s...
|
V-224943
|
Medium
|
The shell protocol will limit the set of folders that applications can open...
|
V-224944
|
Medium
|
Saving passwords in the Remote Desktop Client could allow an unauthorized u...
|
V-224945
|
Medium
|
Preventing users from sharing the local drives on their client computers wi...
|
V-224946
|
Medium
|
This setting controls the ability of users to supply passwords automaticall...
|
V-224947
|
Medium
|
Allowing unsecure RPC communication exposes the system to man-in-the-middle...
|
V-224948
|
Medium
|
Remote connections must be encrypted to prevent interception of data or sen...
|
V-224949
|
Medium
|
Attachments from RSS feeds may not be secure. This setting will prevent att...
|
V-236000
|
Medium
|
A known vulnerability in Windows could allow the execution of malicious cod...
|
V-224951
|
Medium
|
Basic authentication uses plain-text passwords that could be used to compro...
|
V-224952
|
Medium
|
Indexing of encrypted files may expose sensitive data. This setting prevent...
|
V-224953
|
Medium
|
Installation options for applications are typically controlled by administr...
|
V-224954
|
High
|
Standard user accounts must not be granted elevated privileges. Enabling Wi...
|
V-224955
|
Medium
|
Web-based programs may attempt to install malicious software on a system. E...
|
V-224956
|
Medium
|
Windows can be configured to automatically sign the user back in after a Wi...
|
V-224957
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224958
|
High
|
Basic authentication uses plain-text passwords that could be used to compro...
|
V-224959
|
Medium
|
Unencrypted remote access to a system can allow sensitive information to be...
|
V-224960
|
Medium
|
Digest authentication is not as strong as other options and may be subject ...
|
V-224961
|
High
|
Basic authentication uses plain-text passwords that could be used to compro...
|
V-224962
|
Medium
|
Unencrypted remote access to a system can allow sensitive information to be...
|
V-224963
|
Medium
|
Storage of administrative credentials could allow unauthorized access. Disa...
|
V-257502
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224964
|
High
|
An account that does not have Administrator duties must not have Administra...
|
V-224965
|
Medium
|
This policy setting determines whether the Kerberos Key Distribution Center...
|
V-224966
|
Medium
|
This setting determines the maximum amount of time (in minutes) that a gran...
|
V-224967
|
Medium
|
In Kerberos, there are two types of tickets: Ticket Granting Tickets (TGTs)...
|
V-224968
|
Medium
|
This setting determines the period of time (in days) during which a user's ...
|
V-224969
|
Medium
|
This setting determines the maximum time difference (in minutes) that Kerbe...
|
V-224970
|
High
|
Improper access permissions for directory data-related files could allow un...
|
V-224971
|
High
|
Improper access permissions for directory data files could allow unauthoriz...
|
V-224972
|
High
|
When directory service database objects do not have appropriate access cont...
|
V-224973
|
High
|
When Active Directory objects do not have appropriate access control permis...
|
V-224974
|
High
|
When directory service database objects do not have appropriate access cont...
|
V-224975
|
Medium
|
When directory service data files, especially for directories used for iden...
|
V-224976
|
Medium
|
Executing application servers on the same host machine with a directory ser...
|
V-224977
|
Medium
|
Directory data that is not appropriately encrypted is subject to compromise...
|
V-224978
|
High
|
To the extent that anonymous access to directory data (outside the root DSE...
|
V-224979
|
Low
|
The failure to terminate inactive network connections increases the risk of...
|
V-224980
|
Medium
|
When inappropriate audit settings are configured for directory service data...
|
V-224981
|
Medium
|
When inappropriate audit settings are configured for directory service data...
|
V-224982
|
Medium
|
When inappropriate audit settings are configured for directory service data...
|
V-224983
|
Medium
|
When inappropriate audit settings are configured for directory service data...
|
V-224984
|
Medium
|
When inappropriate audit settings are configured for directory service data...
|
V-224985
|
Medium
|
When inappropriate audit settings are configured for directory service data...
|
V-224986
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224987
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224988
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224989
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-224991
|
Medium
|
Domain controllers are part of the chain of trust for PKI authentications. ...
|
V-224992
|
High
|
A PKI implementation depends on the practices established by the Certificat...
|
V-224993
|
High
|
A PKI implementation depends on the practices established by the Certificat...
|
V-224994
|
Medium
|
Smart cards such as the CAC support a two-factor authentication technique. ...
|
V-254373
|
Medium
|
Installation options for applications are typically controlled by administrat...
|
V-205801
|
Medium
|
Installation options for applications are typically controlled by administrat...
|
V-253410
|
Medium
|
Installation options for applications are typically controlled by administrat...
|
V-220856
|
Medium
|
Installation options for applications are typically controlled by administrat...
|
V-254375
|
Medium
|
Web-based programs may attempt to install malicious software on a system. Ens...
|
V-205874
|
Medium
|
Web-based programs may attempt to install malicious software on a system. Ens...
|
V-253412
|
Medium
|
Web-based programs may attempt to install malicious software on a system. Ens...
|
V-220858
|
Medium
|
Web-based programs may attempt to install malicious software on a system. Ens...
|
V-253283
|
High
|
Attackers are constantly looking for vulnerabilities in systems and applicati...
|
V-220726
|
High
|
Attackers are constantly looking for vulnerabilities in systems and applicati...
|
V-254362
|
Medium
|
Data Execution Prevention provides additional protection by performing checks...
|
V-205830
|
Medium
|
Data Execution Prevention provides additional protection by performing checks...
|
V-253396
|
Medium
|
Data Execution Prevention (DEP) provides additional protection by performing ...
|
V-220837
|
Medium
|
Data Execution Prevention (DEP) provides additional protection by performing ...
|
V-254442
|
Medium
|
To ensure secure DoD websites and DoD-signed code are properly validated, the...
|
V-205648
|
Medium
|
To ensure secure DoD websites and DoD-signed code are properly validated, the...
|
V-253427
|
Medium
|
To ensure secure DoD websites and DoD-signed code are properly validated, the...
|
V-220903
|
Medium
|
To ensure secure DoD websites and DoD-signed code are properly validated, the...
|
V-254269
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-205678
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-254270
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-205697
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-254271
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-205679
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-254273
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-205698
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-253278
|
Medium
|
The "Telnet Client" is not installed by default. Some protocols and services ...
|
V-220721
|
Medium
|
Some protocols and services do not support required security features, such a...
|
V-254274
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-205681
|
Medium
|
Unnecessary services increase the attack surface of a system. Some of these s...
|
V-253279
|
Medium
|
The "TFTP Client" is not installed by default. Some protocols and services do...
|
V-220722
|
Medium
|
Some protocols and services do not support required security features, such a...
|
V-254284
|
Medium
|
Secure Boot is a standard that ensures systems boot only to a trusted operati...
|
V-205857
|
Low
|
Secure Boot is a standard that ensures systems boot only to a trusted operati...
|
V-253257
|
Medium
|
Secure Boot is a standard that ensures systems boot only to a trusted operati...
|
V-220700
|
Low
|
Secure Boot is a standard that ensures systems boot only to a trusted operati...
|
V-254357
|
Low
|
Windows Update can obtain updates from additional sources instead of Microsof...
|
V-205870
|
Low
|
Windows Update can obtain updates from additional sources instead of Microsof...
|
V-253394
|
Low
|
Windows 11 allows Windows Update to obtain updates from additional sources in...
|
V-220835
|
Low
|
Windows 10 allows Windows Update to obtain updates from additional sources in...
|
V-224995
|
Medium
|
Unsigned network traffic is susceptible to man-in-the-middle attacks, where...
|
V-224996
|
Medium
|
Enabling this setting on all domain controllers in a domain prevents domain...
|
V-224997
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-224998
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-224999
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225000
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225001
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225002
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225003
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-271430
|
High
|
Weak mappings give rise to security vulnerabilities and demand hardening me...
|
V-225004
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225005
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225006
|
Medium
|
The krbtgt account acts as a service account for the Kerberos Key Distribut...
|
V-225007
|
High
|
An account that does not have Administrator duties must not have Administra...
|
V-225008
|
Medium
|
A compromised local administrator account can provide means for an attacker...
|
V-225009
|
Medium
|
The username is one part of logon credentials that could be used to gain ac...
|
V-225010
|
Medium
|
Unauthenticated RPC clients may allow anonymous access to sensitive informa...
|
V-225011
|
Medium
|
The default Windows configuration caches the last logon credentials for use...
|
V-225012
|
High
|
Credential Guard uses virtualization-based security to protect data that co...
|
V-225013
|
Medium
|
The Windows Security Account Manager (SAM) stores users' passwords. Restric...
|
V-225014
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225015
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225016
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225017
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225018
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225019
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225020
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|
V-225021
|
Medium
|
To ensure secure DoD websites and DoD-signed code are properly validated, t...
|
V-225022
|
Medium
|
To ensure users do not experience denial of service when performing certifi...
|
V-225023
|
Medium
|
To ensure users do not experience denial of service when performing certifi...
|
V-225024
|
Medium
|
A system faces an increased vulnerability threat if the built-in guest acco...
|
V-225025
|
High
|
An account without a password can allow unauthorized access to a system as ...
|
V-225026
|
Medium
|
The built-in administrator account is a well-known account subject to attac...
|
V-225027
|
Medium
|
The built-in guest account is a well-known user account on all Windows syst...
|
V-225028
|
Medium
|
Maintaining an audit trail of system activity logs can help identify config...
|
V-225029
|
Medium
|
Requests sent on the secure channel are authenticated, and sensitive inform...
|
V-225030
|
Medium
|
Requests sent on the secure channel are authenticated, and sensitive inform...
|
V-225031
|
Medium
|
Requests sent on the secure channel are authenticated, and sensitive inform...
|
V-225032
|
Medium
|
Computer account passwords are changed automatically on a regular basis. Di...
|
V-225033
|
Medium
|
Computer account passwords are changed automatically on a regular basis. Th...
|
V-225034
|
Medium
|
A computer connecting to a domain controller will establish a secure channe...
|
V-225035
|
Medium
|
Unattended systems are susceptible to unauthorized use and should be locked...
|
V-225036
|
Medium
|
Failure to display the logon banner prior to a logon attempt will negate le...
|
V-225037
|
Low
|
Failure to display the logon banner prior to a logon attempt will negate le...
|
V-225038
|
Medium
|
Unattended systems are susceptible to unauthorized use and must be locked. ...
|
V-225039
|
Medium
|
The server message block (SMB) protocol provides the basis for many network...
|
V-225040
|
Medium
|
The server message block (SMB) protocol provides the basis for many network...
|
V-225041
|
Medium
|
Some non-Microsoft SMB servers only support unencrypted (plain-text) passwo...
|
V-225042
|
Medium
|
The server message block (SMB) protocol provides the basis for many network...
|
V-225043
|
Medium
|
The server message block (SMB) protocol provides the basis for many network...
|
V-225044
|
High
|
Allowing anonymous SID/Name translation can provide sensitive information f...
|
V-225045
|
High
|
Anonymous enumeration of SAM accounts allows anonymous logon users (null se...
|
V-225046
|
High
|
Allowing anonymous logon users (null session connections) to list all accou...
|
V-225047
|
Medium
|
Access by anonymous users must be restricted. If this setting is enabled, a...
|
V-225048
|
High
|
Allowing anonymous access to named pipes or shares provides the potential f...
|
V-225093
|
Medium
|
Inappropriate granting of user rights can provide system, administrative, a...
|