Vulnerability ID Severity Message
V-254247 Medium Systems at unsupported servicing levels will not receive security updates for...
V-205849 High Systems at unsupported servicing levels will not receive security updates for...
V-253263 High Windows 11 is maintained by Microsoft at servicing levels for specific period...
V-220706 High Windows 10 is maintained by Microsoft at servicing levels for specific period...
V-254355 Medium Enumeration of administrator accounts when elevating can provide part of the ...
V-205714 Medium Enumeration of administrator accounts when elevating can provide part of the ...
V-253391 Medium Enumeration of administrator accounts when elevating can provide part of the ...
V-220832 Medium Enumeration of administrator accounts when elevating can provide part of the ...
V-205751 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-254289 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-205659 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-253301 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-220743 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-254447 Medium The built-in administrator account is a well-known account subject to attack....
V-205909 Medium The built-in administrator account is a well-known account subject to attack....
V-253435 Medium The built-in administrator account is a well-known account subject to attack....
V-220911 Medium The built-in administrator account is a well-known account subject to attack....
V-254291 Medium Information systems not protected with strong password schemes (including pas...
V-205662 Medium Information systems not protected with strong password schemes (including pas...
V-253303 Medium Information systems not protected with strong password schemes (including pas...
V-220745 Medium Information systems not protected with strong password schemes (including pas...
V-254290 Medium Permitting passwords to be changed in immediate succession within the same da...
V-205656 Medium Permitting passwords to be changed in immediate succession within the same da...
V-253302 Medium Permitting passwords to be changed in immediate succession within the same da...
V-220744 Medium Permitting passwords to be changed in immediate succession within the same da...
V-253385 Low Some features may communicate with the vendor, sending system information or ...
V-220826 Low Some features may communicate with the vendor, sending system information or ...
V-254351 Low Some features may communicate with the vendor, sending system information or ...
V-205691 Low Some features may communicate with the vendor, sending system information or ...
V-254448 Medium The built-in guest account is a well-known user account on all Windows system...
V-205910 Medium The built-in guest account is a well-known user account on all Windows system...
V-220912 Medium The built-in guest account is a well-known user account on all Windows system...
V-253436 Medium The built-in guest account is a well-known user account on all Windows system...
V-254424 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-254438 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-205670 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-205675 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-220971 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-253494 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-254440 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-205748 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-220973 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-253496 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-254426 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-205745 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-205908 High An account without a password can allow unauthorized access to a system as on...
V-254446 High An account without a password can allow unauthorized access to a system as on...
V-220910 Medium An account without a password can allow unauthorized access to a system as on...
V-253434 Medium An account without a password can allow unauthorized access to a system as on...
V-254429 Medium A compromised local administrator account can provide means for an attacker t...
V-205715 Medium A compromised local administrator account can provide means for an attacker t...
V-253357 Medium A compromised local administrator account can provide means for an attacker t...
V-220799 Medium A compromised local administrator account can provide means for an attacker t...
V-253432 Medium The built-in administrator account is a well-known account subject to attack....
V-220908 Medium The built-in administrator account is a well-known account subject to attack....
V-254445 Medium A system faces an increased vulnerability threat if the built-in guest accoun...
V-205709 Medium A system faces an increased vulnerability threat if the built-in guest accoun...
V-253433 Medium A system faces an increased vulnerability threat if the built-in guest accoun...
V-220909 Medium A system faces an increased vulnerability threat if the built-in guest accoun...
V-254250 High The ability to set access permissions and auditing is critical to maintaining...
V-205663 High The ability to set access permissions and auditing is critical to maintaining...
V-253265 High The ability to set access permissions and auditing is critical to maintaining...
V-220708 High The ability to set access permissions and auditing is critical to maintaining...
V-254372 Medium Indexing of encrypted files may expose sensitive data. This setting prevents ...
V-205694 Medium Indexing of encrypted files may expose sensitive data. This setting prevents ...
V-253409 Medium Indexing of encrypted files may expose sensitive data. This setting prevents ...
V-220855 Medium Indexing of encrypted files may expose sensitive data. This setting prevents ...
V-254494 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-253483 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-220960 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-254317 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205840 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253324 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220766 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254285 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-205795 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-253297 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-220739 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-254342 Medium An exportable version of credentials is provided to remote hosts when using c...
V-205863 Medium An exportable version of credentials is provided to remote hosts when using c...
V-253368 Medium An exportable version of credentials is provided to remote hosts when using c...
V-220810 Medium An exportable version of credentials is provided to remote hosts when using c...
V-254376 Medium Windows can be configured to automatically sign the user back in after a Wind...
V-205925 Medium Windows can be configured to automatically sign the user back in after a Wind...
V-253413 Medium Windows can be configured to automatically sign the user back in after a Wind...
V-220859 Medium Windows can be configured to automatically sign the user back in after a Wind...
V-260469 High A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, ca...
V-254292 Medium The use of complex passwords increases their strength against attack. The bui...
V-205652 Medium The use of complex passwords increases their strength against attack. The bui...
V-253304 Medium The use of complex passwords increases their strength against guessing and br...
V-260650 High Use of weak or untested encryption algorithms undermines the purposes of util...
V-220746 Medium The use of complex passwords increases their strength against guessing and br...
V-254287 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-205630 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-253299 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-220741 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-254257 Medium The lack of password protection enables anyone to gain access to the informat...
V-205700 Medium The lack of password protection enables anyone to gain access to the informat...
V-254293 High Storing passwords using reversible encryption is essentially the same as stor...
V-205653 High Storing passwords using reversible encryption is essentially the same as stor...
V-253305 High Storing passwords using reversible encryption is essentially the same as stor...
V-220747 High Storing passwords using reversible encryption is essentially the same as stor...
V-254453 Medium Computer account passwords are changed automatically on a regular basis. Disa...
V-205815 Medium Computer account passwords are changed automatically on a regular basis. Disa...
V-253441 Low Computer account passwords are changed automatically on a regular basis. Disa...
V-220917 Low Computer account passwords are changed automatically on a regular basis. Disa...
V-254286 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-205629 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-253298 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-220740 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-254483 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-205716 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254482 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205811 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-253468 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220944 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254485 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205812 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-253471 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220947 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254488 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205813 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-253474 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220950 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254486 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205718 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-253472 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220948 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254489 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205720 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-253475 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220951 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254484 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205717 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-253469 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220945 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254487 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205719 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-253473 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220949 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254349 Medium A system that does not require authentication when resuming from sleep may pr...
V-205867 Medium A system that does not require authentication when resuming from sleep may pr...
V-253380 Medium Authentication must always be required when accessing a system. This setting ...
V-220821 Medium Authentication must always be required when accessing a system. This setting ...
V-254350 Medium A system that does not require authentication when resuming from sleep may pr...
V-205868 Medium A system that does not require authentication when resuming from sleep may pr...
V-253381 Medium Authentication must always be required when accessing a system. This setting ...
V-220822 Medium Authentication must always be required when accessing a system. This setting ...
V-254479 Medium If the private key is discovered, an attacker can use the key to authenticate...
V-205651 Medium If the private key is discovered, an attacker can use the key to authenticate...
V-254341 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205638 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220809 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253367 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254299 Medium Protecting audit information also includes identifying and protecting the too...
V-205731 Medium Protecting audit information also includes identifying and protecting the too...
V-254358 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-205796 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-253337 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-220779 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-254359 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-205797 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-253338 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-220780 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-254360 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-205798 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-253339 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-220781 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-254449 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205644 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253437 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220913 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254297 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205641 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253341 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220783 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254298 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205642 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253342 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220784 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254352 High Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
V-205804 High Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
V-253386 High Allowing autoplay to execute may introduce malicious code to a system. Autopl...
V-220827 High Allowing autoplay to execute may introduce malicious code to a system. Autopl...
V-254354 High Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
V-205806 High Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
V-253388 High Allowing autoplay to execute may introduce malicious code to a system. Autopl...
V-220829 High Allowing autoplay to execute may introduce malicious code to a system. Autopl...
V-254353 High Allowing AutoRun commands to execute may introduce malicious code to a system...
V-205805 High Allowing AutoRun commands to execute may introduce malicious code to a system...
V-253387 High Allowing autorun commands to execute may introduce malicious code to a system...
V-220828 Medium Allowing autorun commands to execute may introduce malicious code to a system...
V-205624 Medium If temporary user accounts remain active when no longer needed or for an exce...
V-254334 Medium When the WDigest Authentication protocol is enabled, plain-text passwords are...
V-205687 Medium When the WDigest Authentication protocol is enabled, plain-text passwords are...
V-253358 Medium When the WDigest Authentication protocol is enabled, plain text passwords are...
V-220800 Medium When the WDigest Authentication protocol is enabled, plain text passwords are...
V-254500 High Inappropriate granting of user rights can provide system, administrative, and...
V-205757 High Inappropriate granting of user rights can provide system, administrative, and...
V-253490 High Inappropriate granting of user rights can provide system, administrative, and...
V-220967 High Inappropriate granting of user rights can provide system, administrative, and...
V-254417 Medium WN22-DC-000330
V-205876 Medium Enabling this setting on all domain controllers in a domain prevents domain m...
V-254416 Medium Unsigned network traffic is susceptible to man-in-the-middle attacks, where a...
V-205820 Medium Unsigned network traffic is susceptible to man-in-the-middle attacks, where a...
V-254391 High Improper access permissions for directory data-related files could allow unau...
V-254392 High Improper access permissions for directory data files could allow unauthorized...
V-205740 High Improper access permissions for directory data files could allow unauthorized...
V-254427 Medium The krbtgt account acts as a service account for the Kerberos Key Distributio...
V-205877 Medium The krbtgt account acts as a service account for the Kerberos Key Distributio...
V-254441 High Credential Guard uses virtualization-based security to protect data that coul...
V-205907 High Credential Guard uses virtualization-based security to protect data that coul...
V-253370 High Credential Guard uses virtualization-based security to protect information th...
V-220812 High Credential Guard uses virtualization based security to protect information th...
V-253447 Low The default Windows configuration caches the last logon credentials for users...
V-220923 Low The default Windows configuration caches the last logon credentials for users...
V-254432 Medium The default Windows configuration caches the last logon credentials for users...
V-205906 Medium The default Windows configuration caches the last logon credentials for users...
V-254450 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-205821 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-254451 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-205822 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-254452 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-205823 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-254345 Medium Registry entries for group policy settings can potentially be changed from th...
V-205866 Medium Registry entries for group policy settings can potentially be changed from th...
V-253373 Medium Enabling this setting and then selecting the "Process even if the Group ...
V-220814 Medium Enabling this setting and then selecting the "Process even if the Group ...
V-254340 Medium Additional security requirements are applied to UNC paths specified in harden...
V-205862 Medium Additional security requirements are applied to UNC paths specified in harden...
V-253362 Medium Additional security requirements are applied to Universal Naming Convention (...
V-250319 Medium Additional security requirements are applied to Universal Naming Convention (...
V-254430 Medium The username is one part of logon credentials that could be used to gain acce...
V-205696 Medium The username is one part of logon credentials that could be used to gain acce...
V-253379 Medium The username is one part of logon credentials that could be used to gain acce...
V-220820 Medium The username is one part of logon credentials that could be used to gain acce...
V-254454 Medium Computer account passwords are changed automatically on a regular basis. This...
V-205911 Medium Computer account passwords are changed automatically on a regular basis. This...
V-253442 Low Computer account passwords are changed automatically on a regular basis. This...
V-220918 Low Computer account passwords are changed automatically on a regular basis. This...
V-254476 Medium This setting controls the signing requirements for LDAP clients. This must be...
V-205920 Medium This setting controls the signing requirements for LDAP clients. This must be...
V-253463 Medium This setting controls the signing requirements for LDAP clients. This setting...
V-220939 Medium This setting controls the signing requirements for LDAP clients. This setting...
V-253284 High Attackers are constantly looking for vulnerabilities in systems and applicati...
V-220727 High Attackers are constantly looking for vulnerabilities in systems and applicati...
V-254364 Medium The shell protocol will limit the set of folders that applications can open w...
V-205872 Medium The shell protocol will limit the set of folders that applications can open w...
V-253398 Medium The shell protocol will limit the set of folders applications can open when r...
V-220839 Medium The shell protocol will limit the set of folders applications can open when r...
V-254248 Medium Malicious software can establish a base on individual desktops and servers. E...
V-205850 High Malicious software can establish a base on individual desktops and servers. E...
V-253264 High Malicious software can establish a base on individual desktops and servers. E...
V-220707 High Malicious software can establish a base on individual desktops and servers. E...
V-254346 Medium Some features may communicate with the vendor, sending system information or ...
V-205688 Medium Some features may communicate with the vendor, sending system information or ...
V-253374 Medium Some features may communicate with the vendor, sending system information or ...
V-220815 Medium Some features may communicate with the vendor, sending system information or ...
V-254344 Medium Compromised boot drivers can introduce malware prior to protection mechanisms...
V-205865 Medium Compromised boot drivers can introduce malware prior to protection mechanisms...
V-253372 Medium The default behavior is for Early Launch Antimalware - Boot-Start Driver Init...
V-220813 Medium By being launched first by the kernel, ELAM ( Early Launch Antimalware) is en...
V-253275 High IIS is not installed by default. Installation of Internet Information System ...
V-220718 High Installation of Internet Information System (IIS) may allow unauthorized inte...
V-254456 Medium Unattended systems are susceptible to unauthorized use and must be locked whe...
V-205633 Medium Unattended systems are susceptible to unauthorized use and should be locked w...
V-253444 Medium Unattended systems are susceptible to unauthorized use and must be locked whe...
V-220920 Medium Unattended systems are susceptible to unauthorized use and should be locked w...
V-254347 Medium Some features may communicate with the vendor, sending system information or ...
V-205689 Medium Some features may communicate with the vendor, sending system information or ...
V-253376 Medium Some features may communicate with the vendor, sending system information or ...
V-220817 Medium Some features may communicate with the vendor, sending system information or ...
V-253382 High Remote assistance allows another user to view or take control of the local se...
V-220823 High Remote assistance allows another user to view or take control of the local se...
V-253395 Medium Microsoft Defender SmartScreen helps protect systems from programs downloaded...
V-220836 Medium Windows Defender SmartScreen helps protect systems from programs downloaded f...
V-254361 Medium Microsoft Defender antivirus SmartScreen helps protect systems from programs ...
V-205692 Medium Windows Defender SmartScreen helps protect systems from programs downloaded f...
V-254333 Medium Slide shows that are displayed on the lock screen could display sensitive inf...
V-205686 Medium Slide shows that are displayed on the lock screen could display sensitive inf...
V-254265 Medium A firewall provides a line of defense against attack, allowing or blocking in...
V-253281 Medium A firewall provides a line of defense against attack, allowing or blocking in...
V-220724 Medium A firewall provides a line of defense against attack, allowing or blocking in...
V-214936 Medium A firewall provides a line of defense against attack, allowing or blocking in...
V-254371 Medium Basic authentication uses plain-text passwords that could be used to compromi...
V-205693 Medium Basic authentication uses plain-text passwords that could be used to compromi...
V-253408 Medium Basic authentication uses plain text passwords that could be used to compromi...
V-220854 Medium Basic authentication uses plain text passwords that could be used to compromi...
V-223079 Medium This policy setting allows you to manage whether Internet Explorer checks for...
V-223077 Medium This policy setting determines whether Internet Explorer 11 uses 64-bit proce...
V-254348 Medium Enabling interaction with the network selection UI allows users to change con...
V-205690 Medium Enabling interaction with the network selection UI allows users to change con...
V-253378 Medium Enabling interaction with the network selection UI allows users to change con...
V-220819 Medium Enabling interaction with the network selection UI allows users to change con...
V-254370 Medium Attachments from RSS feeds may not be secure. This setting will prevent attac...
V-205873 Medium Attachments from RSS feeds may not be secure. This setting will prevent attac...
V-253407 Medium Attachments from RSS feeds may not be secure. This setting will prevent attac...
V-220853 Medium Attachments from RSS feeds may not be secure. This setting will prevent attac...
V-254457 Medium Failure to display the logon banner prior to a logon attempt will negate lega...
V-253445 Medium Failure to display the logon banner prior to a logon attempt will negate lega...
V-205631 Medium Failure to display the logon banner prior to a logon attempt will negate lega...
V-220921 Medium Failure to display the logon banner prior to a logon attempt will negate lega...
V-220844 Medium The Windows Defender SmartScreen filter in Microsoft Edge provides warning me...
V-220841 Medium The Windows Defender SmartScreen filter in Microsoft Edge provides warning me...
V-220840 Medium The Windows Defender SmartScreen filter in Microsoft Edge provides warning me...
V-254466 High Anonymous enumeration of SAM accounts allows anonymous logon users (null sess...
V-205914 High Anonymous enumeration of SAM accounts allows anonymous logon users (null sess...
V-253453 High Anonymous enumeration of SAM accounts allows anonymous log on users (null ses...
V-220929 High Anonymous enumeration of SAM accounts allows anonymous log on users (null ses...
V-254467 High Allowing anonymous logon users (null session connections) to list all account...
V-205724 High Allowing anonymous logon users (null session connections) to list all account...
V-253454 High Allowing anonymous logon users (null session connections) to list all account...
V-220930 High Allowing anonymous logon users (null session connections) to list all account...
V-254339 Medium Insecure guest logons allow unauthenticated access to shared folders. Shared ...
V-205861 Medium Insecure guest logons allow unauthenticated access to shared folders. Shared ...
V-253360 Medium Insecure guest logons allow unauthenticated access to shared folders. Shared ...
V-220802 Medium Insecure guest logons allow unauthenticated access to shared folders. Shared ...
V-254473 Medium Certain encryption types are no longer considered secure. The DES and RC4 enc...
V-205708 Medium Certain encryption types are no longer considered secure. The DES and RC4 enc...
V-253460 Medium Certain encryption types are no longer considered secure. This setting config...
V-220936 Medium Certain encryption types are no longer considered secure. This setting config...
V-254460 Medium The server message block (SMB) protocol provides the basis for many network o...
V-205825 Medium The server message block (SMB) protocol provides the basis for many network o...
V-254475 High The Kerberos v5 authentication protocol is the default for authentication of ...
V-205919 High The Kerberos v5 authentication protocol is the default for authentication of ...
V-253462 High The Kerberos v5 authentication protocol is the default for authentication of ...
V-220938 High The Kerberos v5 authentication protocol is the default for authentication of ...
V-254461 Medium The server message block (SMB) protocol provides the basis for many network o...
V-205826 Medium The server message block (SMB) protocol provides the basis for many network o...
V-254463 Medium The server message block (SMB) protocol provides the basis for many network o...
V-205827 Medium The server message block (SMB) protocol provides the basis for many network o...
V-254464 Medium The server message block (SMB) protocol provides the basis for many network o...
V-205828 Medium The server message block (SMB) protocol provides the basis for many network o...
V-254468 Medium Access by anonymous users must be restricted. If this setting is enabled, ano...
V-205915 Medium Access by anonymous users must be restricted. If this setting is enabled, ano...
V-253455 Medium Access by anonymous users must be restricted. If this setting is enabled, the...
V-220937 High The LAN Manager hash uses a weak encryption algorithm and there are several t...
V-254277 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-205684 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-253288 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-220731 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-254276 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-205683 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-253287 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-220730 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-254471 Medium NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
V-205917 Medium NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
V-253458 Medium NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
V-220934 Medium NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
V-254469 High Allowing anonymous access to named pipes or shares provides the potential for...
V-205725 High Allowing anonymous access to named pipes or shares provides the potential for...
V-253456 High Allowing anonymous access to named pipes or shares provides the potential for...
V-220932 High Allowing anonymous access to named pipes or shares provides the potential for...
V-254433 Medium The Windows SAM stores users' passwords. Restricting Remote Procedure Call (R...
V-205747 Medium The Windows SAM stores users' passwords. Restricting Remote Procedure Call (R...
V-253457 Medium The Windows SAM stores users' passwords. Restricting remote rpc connections t...
V-220933 Medium The Windows SAM stores users' passwords. Restricting remote rpc connections t...
V-254470 Medium Services using Local System that use Negotiate when reverting to NTLM authent...
V-205916 Medium Services using Local System that use Negotiate when reverting to NTLM authent...
V-254477 Medium Microsoft has implemented a variety of security support providers for use wit...
V-205921 Medium Microsoft has implemented a variety of security support providers for use wit...
V-254478 Medium Microsoft has implemented a variety of security support providers for use wit...
V-205922 Medium Microsoft has implemented a variety of security support providers for use wit...
V-254462 Medium Some non-Microsoft SMB servers only support unencrypted (plain-text) password...
V-205655 Medium Some non-Microsoft SMB servers only support unencrypted (plain-text) password...
V-253450 Medium Some non-Microsoft SMB servers only support unencrypted (plain text) password...
V-220926 Medium Some non-Microsoft SMB servers only support unencrypted (plain text) password...
V-254275 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-205682 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-254335 Low Configuring the system to disable IPv6 source routing protects against spoofing.
V-205858 Low Configuring the system to disable IPv6 source routing protects against spoofing.
V-253353 Medium Configuring the system to disable IPv6 source routing protects against spoofing.
V-220795 Medium Configuring the system to disable IPv6 source routing protects against spoofing.
V-254272 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205680 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-253277 Medium "Simple TCP/IP Services" is not installed by default. Some protocols and serv...
V-220720 Medium Some protocols and services do not support required security features, such a...
V-254336 Low Configuring the system to disable IP source routing protects against spoofing.
V-205859 Low Configuring the system to disable IP source routing protects against spoofing.
V-254288 Medium A system is more vulnerable to unauthorized access when system users recycle ...
V-205660 Medium A system is more vulnerable to unauthorized access when system users recycle ...
V-253300 Medium A system is more vulnerable to unauthorized access when system users recycle ...
V-220742 Medium A system is more vulnerable to unauthorized access when system users recycle ...
V-254258 Medium Passwords that do not expire or are reused increase the exposure of a passwor...
V-205658 Medium Passwords that do not expire or are reused increase the exposure of a passwor...
V-253273 Medium Passwords that do not expire increase exposure with a greater probability of ...
V-220716 Medium Passwords that do not expire increase exposure with a greater probability of ...
V-254474 High The LAN Manager hash uses a weak encryption algorithm and there are several t...
V-205654 High The LAN Manager hash uses a weak encryption algorithm and there are several t...
V-253461 High The LAN Manager hash uses a weak encryption algorithm and there are several t...
V-254377 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205639 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253414 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220860 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254278 Medium Windows PowerShell 5.x added advanced logging features that can provide addit...
V-205685 Medium Windows PowerShell 5.x added advanced logging features that can provide addit...
V-253285 Medium Windows PowerShell 5.0 added advanced logging features which can provide addi...
V-220728 Medium Windows PowerShell 5.0 added advanced logging features which can provide addi...
V-205869 Medium Some features may communicate with the vendor, sending system information or ...
V-253393 Medium Some features may communicate with the vendor, sending system information or ...
V-220834 Medium Some features may communicate with the vendor, sending system information or ...
V-254367 Medium This setting controls the ability of users to supply passwords automatically ...
V-205809 Medium This setting controls the ability of users to supply passwords automatically ...
V-253404 Medium This setting controls the ability of users to supply passwords automatically ...
V-220850 Medium This setting controls the ability of users to supply passwords automatically ...
V-254369 Medium Remote connections must be encrypted to prevent interception of data or sensi...
V-205637 Medium Remote connections must be encrypted to prevent interception of data or sensi...
V-253406 Medium Remote connections must be encrypted to prevent interception of data or sensi...
V-220852 Medium Remote connections must be encrypted to prevent interception of data or sensi...
V-260469 High A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, ...
V-260470 High To mitigate the risk of unauthorized access to sensitive information by ent...
V-260471 Medium If auditing is enabled late in the startup process, the actions of some sta...
V-260472 Low Restricting access to the kernel message buffer limits access only to root....
V-260473 Medium Kernel core dumps may contain the full contents of system memory at the tim...
V-260474 Medium Some adversaries launch attacks with the intent of executing code in nonexe...
V-260475 Medium Some adversaries launch attacks with the intent of executing code in nonexe...
V-260476 Low Changes to any software components can have significant effects on the over...
V-260477 Medium Previous versions of software components that are not removed from the info...
V-260478 Medium Use of a complex password helps to increase the time and resources required...
V-260479 Low Inaccurate time stamps make it more difficult to correlate events and can l...
V-260480 Low Inaccurate time stamps make it more difficult to correlate events and can l...
V-260481 Low Inaccurate time stamps make it more difficult to correlate events and can l...
V-260482 High It is detrimental for operating systems to provide, or install by default, ...
V-260483 High It is detrimental for operating systems to provide, or install by default, ...
V-260484 Medium Operating systems handling data requiring "data at rest" protections must e...
V-260485 Medium Protecting audit information also includes identifying and protecting the t...
V-260486 Medium If Ubuntu 22.04 LTS were to allow any user to make changes to software libr...
V-260487 Medium If the operating system were to allow any user to make changes to software ...
V-260488 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260489 Medium Any operating system providing too much information in error messages risks...
V-260490 Medium Any operating system providing too much information in error messages risks...
V-260491 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260492 Medium Protecting audit information also includes identifying and protecting the t...
V-260493 Medium Protecting audit information also includes identifying and protecting the t...
V-260494 Medium Protecting audit information also includes identifying and protecting the t...
V-260495 Medium If Ubuntu 22.04 LTS were to allow any user to make changes to software libr...
V-260496 Medium If Ubuntu 22.04 LTS were to allow any user to make changes to software libr...
V-260497 Medium If the operating system were to allow any user to make changes to software ...
V-260498 Medium If the operating system were to allow any user to make changes to software ...
V-260499 Medium If the operating system were to allow any user to make changes to software ...
V-260500 Medium If the operating system were to allow any user to make changes to software ...
V-260501 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260502 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260503 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260504 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260505 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260506 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260507 Medium Protecting audit information also includes identifying and protecting the t...
V-260508 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260509 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260510 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260511 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260512 Medium Any operating system providing too much information in error messages risks...
V-260513 Medium Preventing unauthorized information transfers mitigates the risk of informa...
V-260514 Medium Remote access services, such as those providing remote access to network de...
V-260515 Medium Remote access services, such as those providing remote access to network de...
V-260516 Medium Firewalls protect computers from network attacks by blocking or limiting ac...
V-260517 Medium Denial of service (DoS) is a condition when a resource is not available for...
V-260518 Medium To prevent unauthorized connection of devices, unauthorized transfer of inf...
V-260519 Low Inaccurate time stamps make it more difficult to correlate events and can l...
V-260520 Low Inaccurate time stamps make it more difficult to correlate events and can l...
V-260521 Low If time stamps are not consistently applied and there is no common time ref...
V-260522 Medium DoS is a condition when a resource is not available for legitimate users. W...
V-260523 High Without protection of the transmitted information, confidentiality and inte...
V-260524 High Without protection of the transmitted information, confidentiality and inte...
V-260533 Medium Without cryptographic integrity protections provided by FIPS-validated cryp...
V-260534 Medium Nonlocal maintenance and diagnostic activities are those activities conduct...
V-260537 Medium A session lock is a temporary action taken when a user stops work and moves...
V-260538 Medium A session lock is a temporary action taken when a user stops work and moves...
V-260539 High A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, ...
V-260540 Medium Without authenticating devices, unidentified or unknown devices may be intr...
V-260541 Medium Without protection of communications with wireless peripherals, confidentia...
V-260542 Medium To ensure individual accountability and prevent unauthorized access, organi...
V-260543 Medium To ensure accountability and prevent unauthenticated access, organizational...
V-260545 Medium Enforcing a minimum password lifetime helps to prevent repeated password ch...
V-260546 Medium Any password, no matter how complex, can eventually be cracked. Therefore, ...
V-260547 Medium Inactive identifiers pose a risk to systems and applications because attack...
V-260535 Medium Display of a standardized and approved use notification before granting acc...
V-260548 Medium Temporary accounts are privileged or nonprivileged accounts established dur...
V-260549 Low By limiting the number of failed logon attempts, the risk of unauthorized s...
V-260550 Low Limiting the number of logon attempts over a certain time interval reduces ...
V-260552 Low Ubuntu 22.04 LTS management includes the ability to control the number of u...
V-260553 Medium A session lock is a temporary action taken when a user stops work and moves...
V-260554 Medium Terminating an idle interactive command shell user session within a short t...
V-260535 Medium Display of a standardized and approved use notification before granting acc...
V-260536 Medium Display of a standardized and approved use notification before granting acc...
V-260555 Medium Setting the most restrictive default permissions ensures newly created acco...
V-260556 Medium Control of program execution is a mechanism used to prevent execution of un...
V-260557 Medium Control of program execution is a mechanism used to prevent execution of un...
V-260558 Medium Without reauthentication, users may access resources or perform tasks for w...
V-260559 High An isolation boundary provides access control and protects the integrity of...
V-260560 Medium Use of a complex password helps to increase the time and resources required...
V-260561 Medium Use of a complex password helps to increase the time and resources required...
V-260562 Medium Use of a complex password helps to increase the time and resources required...
V-260563 Medium Use of a complex password helps to increase the time and resources required...
V-260564 Medium If Ubuntu 22.04 LTS allows the user to select passwords based on dictionary...
V-260565 Medium The shorter the password, the lower the number of possible combinations tha...
V-260566 Medium If the operating system allows the user to consecutively reuse extensive po...
V-260567 Medium Use of a complex password helps to increase the time and resources required...
V-260569 Medium Password complexity, or strength, is a measure of the effectiveness of a pa...
V-260570 High If an account has an empty password, anyone could log on and run commands w...
V-260571 High If an account has an empty password, anyone could log on and run commands w...
V-260572 Medium Passwords need to be protected at all times, and encryption is the standard...
V-260573 Medium Using an authentication device, such as a CAC or token separate from the in...
V-260574 Medium The use of PIV credentials facilitates standardization and reduces the risk...
V-260575 Medium Without the use of multifactor authentication, the ease of access to privil...
V-260576 Medium The use of PIV credentials facilitates standardization and reduces the risk...
V-260577 Medium Without path validation, an informed trust decision by the relying party ca...
V-260578 Medium Without configuring a local cache of revocation data, there is the potentia...
V-260579 High Without mapping the certificate used to authenticate to the user account, t...
V-260580 Medium Untrusted certificate authorities (CA) can issue certificates, but they may...
V-260581 Low If cached authentication information is out-of-date, the validity of the au...
V-260582 Medium Without verification of the security functions, security functions may not ...
V-260583 Medium Without verification of the security functions, security functions may not ...
V-260584 Medium Unauthorized changes to the baseline configuration could make the system vu...
V-260585 Medium Without verification of the security functions, security functions may not ...
V-260586 Medium Protecting the integrity of the tools used for auditing purposes is a criti...
V-260587 Low Information stored in one location is vulnerable to accidental or incidenta...
V-260588 Medium Failure to a known state can address safety or security in accordance with ...
V-260589 Medium Remote access services, such as those providing remote access to network de...
V-260590 Medium Without establishing the when, where, type, source, and outcome of events t...
V-260591 Medium Without establishing the when, where, type, source, and outcome of events t...
V-260592 Low Information stored in one location is vulnerable to accidental or incidenta...
V-260593 Low It is critical for the appropriate personnel to be aware if a system is at ...
V-260594 Medium It is critical that when the operating system is at risk of failing to proc...
V-260595 Low To ensure operating systems have a sufficient storage capacity in which to ...
V-260596 Low If security personnel are not notified immediately when storage volume reac...
V-260597 Medium Unauthorized disclosure of audit records can reveal system and configuratio...
V-260598 Medium Unauthorized disclosure of audit records can reveal system and configuratio...
V-260599 Medium Unauthorized disclosure of audit records can reveal system and configuratio...
V-260600 Medium If audit information were to become compromised, then forensic analysis and...
V-260601 Medium Without the capability to restrict which roles and individuals can select w...
V-260602 Medium Without the capability to restrict which roles and individuals can select w...
V-260603 Medium Without the capability to restrict which roles and individuals can select w...
V-260604 Medium Without generating audit records specific to the security and mission needs...
V-260605 Medium Without generating audit records that are specific to the security and miss...
V-260606 Medium Without generating audit records that are specific to the security and miss...
V-260607 Medium Without generating audit records that are specific to the security and miss...
V-260608 Medium Without generating audit records that are specific to the security and miss...
V-260609 Medium Without generating audit records that are specific to the security and miss...
V-260610 Medium Without generating audit records that are specific to the security and miss...
V-260611 Medium Without generating audit records that are specific to the security and miss...
V-260612 Medium Without generating audit records that are specific to the security and miss...
V-260613 Medium Without generating audit records that are specific to the security and miss...
V-260613 Medium Without generating audit records that are specific to the security and miss...
V-260614 Medium Without generating audit records that are specific to the security and miss...
V-260615 Medium Without generating audit records that are specific to the security and miss...
V-260616 Medium Without generating audit records that are specific to the security and miss...
V-260617 Medium Without generating audit records that are specific to the security and miss...
V-260618 Medium Without generating audit records that are specific to the security and miss...
V-260619 Medium Without generating audit records that are specific to the security and miss...
V-260620 Medium Without generating audit records that are specific to the security and miss...
V-260621 Medium Without generating audit records that are specific to the security and miss...
V-260622 Medium Without generating audit records that are specific to the security and miss...
V-260623 Medium Without generating audit records that are specific to the security and miss...
V-260624 Medium Without generating audit records that are specific to the security and miss...
V-260625 Medium Without generating audit records that are specific to the security and miss...
V-260626 Medium Without generating audit records that are specific to the security and miss...
V-260627 Medium Without generating audit records that are specific to the security and miss...
V-260628 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260629 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260630 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260631 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260632 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260633 Medium Without generating audit records specific to the security and mission needs...
V-260634 Medium Without generating audit records specific to the security and mission needs...
V-260635 Medium Without generating audit records specific to the security and mission needs...
V-260636 Medium Without generating audit records specific to the security and mission needs...
V-260637 Medium Without generating audit records that are specific to the security and miss...
V-260638 Medium Without generating audit records specific to the security and mission needs...
V-260639 Medium Without generating audit records specific to the security and mission needs...
V-260640 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260641 Medium Without generating audit records specific to the security and mission needs...
V-260642 Medium Without generating audit records specific to the security and mission needs...
V-260643 Medium Without generating audit records specific to the security and mission needs...
V-260644 Medium Without generating audit records specific to the security and mission needs...
V-260645 Medium Without generating audit records specific to the security and mission needs...
V-260646 Medium Without generating audit records specific to the security and mission needs...
V-260647 Medium Without generating audit records specific to the security and mission needs...
V-260648 Medium In certain situations, software applications/programs need to execute with ...
V-260649 Medium If events associated with nonlocal administrative access or diagnostic sess...
V-260650 High Use of weak or untested encryption algorithms undermines the purposes of ut...
V-224819 High Using a privileged account to perform routine functions makes the computer ...
V-254365 Medium Saving passwords in the Remote Desktop Client could allow an unauthorized use...
V-205808 Medium Saving passwords in the Remote Desktop Client could allow an unauthorized use...
V-253402 Medium Saving passwords in the Remote Desktop Client could allow an unauthorized use...
V-220848 Medium Saving passwords in the Remote Desktop Client could allow an unauthorized use...
V-254366 Medium Preventing users from sharing the local drives on their client computers with...
V-205722 Medium Preventing users from sharing the local drives on their client computers with...
V-224820 Medium The longer a password is in use, the greater the opportunity for someone to...
V-224821 High Using applications that access the Internet or have potential Internet sour...
V-224822 Medium Backup Operators are able to read and write to any file in the system, rega...
V-224823 Medium Application/service account passwords must be of sufficient length to preve...
V-224824 Medium Setting application account passwords to expire may cause applications to s...
V-224825 Medium Shared accounts (accounts where two or more people log on with the same use...
V-224826 Medium Using an allowlist provides a configuration management method to allow the ...
V-224827 Medium Credential Guard uses virtualization-based security to protect data that co...
V-224828 High Systems at unsupported servicing levels will not receive security updates f...
V-224829 High Malicious software can establish a base on individual desktops and servers....
V-224830 Medium A properly configured Host-based Intrusion Detection System (HIDS) or Host-...
V-224831 High The ability to set access permissions and auditing is critical to maintaini...
V-224832 Medium Changing the system's file and directory permissions allows the possibility...
V-224833 Medium Changing the system's file and directory permissions allows the possibility...
V-224834 Medium Changing the system's file and directory permissions allows the possibility...
V-224835 Medium The registry is integral to the function, security, and stability of the Wi...
V-224836 Low Windows shares are a means by which files, folders, printers, and other res...
V-224837 Medium Outdated or unused accounts provide penetration points that may go undetect...
V-224838 Medium The lack of password protection enables anyone to gain access to the inform...
V-224839 Medium Passwords that do not expire or are reused increase the exposure of a passw...
V-224840 Medium Monitoring system files for changes against a baseline on a regular basis m...
V-224841 Medium Shares on a system provide network access. To prevent exposing sensitive in...
V-254368 Medium Allowing unsecure RPC communication exposes the system to man-in-the-middle a...
V-205636 Medium Allowing unsecure RPC communication exposes the system to man-in-the-middle a...
V-254431 Medium Unauthenticated RPC clients may allow anonymous access to sensitive informati...
V-205814 Medium Unauthenticated RPC clients may allow anonymous access to sensitive informati...
V-253383 Medium Configuring RPC to restrict unauthenticated RPC clients from connecting to th...
V-220824 Medium Configuring RPC to restrict unauthenticated RPC clients from connecting to th...
V-254379 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-205816 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-253417 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-220863 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-224842 Medium Use of software certificates and their accompanying installation files for ...
V-224843 High This requirement addresses protection of user-generated data as well as ope...
V-224844 Medium Information can be either unintentionally or maliciously disclosed or modif...
V-224845 Medium Unnecessary roles and features increase the attack surface of a system. Lim...
V-224846 Medium A firewall provides a line of defense against attack, allowing or blocking ...
V-224847 Medium Without the use of automated mechanisms to scan for security flaws on a con...
V-224848 Medium If temporary user accounts remain active when no longer needed or for an ex...
V-224849 Medium Emergency administrator accounts are privileged accounts established in res...
V-224850 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224851 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224852 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224853 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224854 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224855 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224856 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 ...
V-224857 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 ...
V-224858 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 ...
V-224859 Medium Windows PowerShell 5.0 added advanced logging features that can provide add...
V-224860 Medium The FTP service allows remote users to access shared files and directories....
V-224861 Medium The FTP service allows remote users to access shared files and directories ...
V-224862 Low The Windows Time Service controls time synchronization settings. Time synch...
V-224863 Medium Accounts or groups given rights on a system may show up as unresolved SIDs ...
V-224864 Low Secure Boot is a standard that ensures systems boot only to a trusted opera...
V-224865 Low UEFI provides additional security features in comparison to legacy BIOS fir...
V-224866 Medium The account lockout feature, when enabled, prevents brute-force password at...
V-254378 High Basic authentication uses plain-text passwords that could be used to compro...
V-205711 High Basic authentication uses plain-text passwords that could be used to compro...
V-253416 High Basic authentication uses plain text passwords that could be used to compromi...
V-220862 High Basic authentication uses plain text passwords that could be used to compromi...
V-254380 Medium Digest authentication is not as strong as other options and may be subject to...
V-205712 Medium Digest authentication is not as strong as other options and may be subject to...
V-253421 Medium Digest authentication is not as strong as other options and may be subject to...
V-220868 Medium Digest authentication is not as strong as other options and may be subject to...
V-254381 High Basic authentication uses plain-text passwords that could be used to compromi...
V-205713 High Basic authentication uses plain-text passwords that could be used to compromi...
V-253418 High Basic authentication uses plain text passwords that could be used to compromi...
V-220865 High Basic authentication uses plain text passwords that could be used to compromi...
V-253426 Medium Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (D...
V-220902 Medium Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (D...
V-224867 Medium The account lockout feature, when enabled, prevents brute-force password at...
V-224868 Medium The account lockout feature, when enabled, prevents brute-force password at...
V-224869 Medium A system is more vulnerable to unauthorized access when system users recycl...
V-224870 Medium The longer a password is in use, the greater the opportunity for someone to...
V-224871 Medium Permitting passwords to be changed in immediate succession within the same ...
V-224872 Medium Information systems not protected with strong password schemes (including p...
V-224873 Medium The use of complex passwords increases their strength against attack. The b...
V-224874 High Storing passwords using reversible encryption is essentially the same as st...
V-224875 Medium Protection of log data includes assuring the log data is not accidentally l...
V-224876 Medium Protection of log data includes ensuring the log data is not accidentally l...
V-224877 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224878 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224879 Medium Maintaining an audit trail of system activity logs can help identify config...
V-218822 Medium Vulnerability Discussion TLS is a required transmission protocol for a web s...
V-218821 Medium TLS encryption is a required security setting for a private web server. Encry...
V-254263 Medium Information can be either unintentionally or maliciously disclosed or modifie...
V-205829 Medium Information can be either unintentionally or maliciously disclosed or modifie...
V-254343 Medium Virtualization Based Security (VBS) provides the platform for the additional ...
V-205864 Medium Virtualization-based security (VBS) provides the platform for the additional ...
V-253369 Medium Virtualization-based Security (VBS) provides the platform for the additional ...
V-220811 Medium Virtualization Based Security (VBS) provides the platform for the additional ...
V-254374 High Standard user accounts must not be granted elevated privileges. Enabling Wind...
V-205802 High Standard user accounts must not be granted elevated privileges. Enabling Wind...
V-253411 High Standard user accounts must not be granted elevated privileges. Enabling Wind...
V-220857 High Standard user accounts must not be granted elevated privileges. Enabling Wind...
V-224880 Medium Protecting audit information also includes identifying and protecting the t...
V-224881 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224882 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224883 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224884 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224885 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224886 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224887 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224888 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224890 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224891 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224892 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224893 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224894 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224895 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224896 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224897 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224898 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224899 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224900 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224901 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224902 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224903 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224904 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224905 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224906 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224907 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224908 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224909 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224910 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224911 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224912 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224913 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224914 Medium Slide shows that are displayed on the lock screen could display sensitive i...
V-224915 Medium When the WDigest Authentication protocol is enabled, plain-text passwords a...
V-224916 Low Configuring the system to disable IPv6 source routing protects against spoo...
V-224917 Low Configuring the system to disable IP source routing protects against spoofing.
V-224918 Low Allowing ICMP redirect of routes can lead to traffic not being routed prope...
V-224919 Low Configuring the system to ignore name release requests, except from WINS se...
V-224920 Medium Insecure guest logons allow unauthenticated access to shared folders. Share...
V-224921 Medium Additional security requirements are applied to Universal Naming Convention...
V-224922 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224923 Medium Virtualization-based security (VBS) provides the platform for the additiona...
V-224924 Medium Compromised boot drivers can introduce malware prior to protection mechanis...
V-224925 Medium Registry entries for group policy settings can potentially be changed from ...
V-224926 Medium Some features may communicate with the vendor, sending system information o...
V-224927 Medium Some features may communicate with the vendor, sending system information o...
V-224928 Medium Enabling interaction with the network selection UI allows users to change c...
V-224929 Medium A system that does not require authentication when resuming from sleep may ...
V-224930 Medium A system that does not require authentication when resuming from sleep may ...
V-224931 Low Some features may communicate with the vendor, sending system information o...
V-224932 High Allowing AutoPlay to execute may introduce malicious code to a system. Auto...
V-224933 High Allowing AutoRun commands to execute may introduce malicious code to a syst...
V-224934 High Allowing AutoPlay to execute may introduce malicious code to a system. Auto...
V-224935 Medium Enumeration of administrator accounts when elevating can provide part of th...
V-224936 Medium Some features may communicate with the vendor, sending system information o...
V-224937 Medium Inadequate log size will cause the log to fill up quickly. This may prevent...
V-224938 Medium Inadequate log size will cause the log to fill up quickly. This may prevent...
V-224939 Medium Inadequate log size will cause the log to fill up quickly. This may prevent...
V-224940 Medium Windows SmartScreen helps protect systems from programs downloaded from the...
V-224941 Medium Data Execution Prevention provides additional protection by performing chec...
V-224942 Low Legacy plug-in applications may continue to function when a File Explorer s...
V-224943 Medium The shell protocol will limit the set of folders that applications can open...
V-224944 Medium Saving passwords in the Remote Desktop Client could allow an unauthorized u...
V-224945 Medium Preventing users from sharing the local drives on their client computers wi...
V-224946 Medium This setting controls the ability of users to supply passwords automaticall...
V-224947 Medium Allowing unsecure RPC communication exposes the system to man-in-the-middle...
V-224948 Medium Remote connections must be encrypted to prevent interception of data or sen...
V-224949 Medium Attachments from RSS feeds may not be secure. This setting will prevent att...
V-236000 Medium A known vulnerability in Windows could allow the execution of malicious cod...
V-224951 Medium Basic authentication uses plain-text passwords that could be used to compro...
V-224952 Medium Indexing of encrypted files may expose sensitive data. This setting prevent...
V-224953 Medium Installation options for applications are typically controlled by administr...
V-224954 High Standard user accounts must not be granted elevated privileges. Enabling Wi...
V-224955 Medium Web-based programs may attempt to install malicious software on a system. E...
V-224956 Medium Windows can be configured to automatically sign the user back in after a Wi...
V-224957 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224958 High Basic authentication uses plain-text passwords that could be used to compro...
V-224959 Medium Unencrypted remote access to a system can allow sensitive information to be...
V-224960 Medium Digest authentication is not as strong as other options and may be subject ...
V-224961 High Basic authentication uses plain-text passwords that could be used to compro...
V-224962 Medium Unencrypted remote access to a system can allow sensitive information to be...
V-224963 Medium Storage of administrative credentials could allow unauthorized access. Disa...
V-257502 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224964 High An account that does not have Administrator duties must not have Administra...
V-224965 Medium This policy setting determines whether the Kerberos Key Distribution Center...
V-224966 Medium This setting determines the maximum amount of time (in minutes) that a gran...
V-224967 Medium In Kerberos, there are two types of tickets: Ticket Granting Tickets (TGTs)...
V-224968 Medium This setting determines the period of time (in days) during which a user's ...
V-224969 Medium This setting determines the maximum time difference (in minutes) that Kerbe...
V-224970 High Improper access permissions for directory data-related files could allow un...
V-224971 High Improper access permissions for directory data files could allow unauthoriz...
V-224972 High When directory service database objects do not have appropriate access cont...
V-224973 High When Active Directory objects do not have appropriate access control permis...
V-224974 High When directory service database objects do not have appropriate access cont...
V-224975 Medium When directory service data files, especially for directories used for iden...
V-224976 Medium Executing application servers on the same host machine with a directory ser...
V-224977 Medium Directory data that is not appropriately encrypted is subject to compromise...
V-224978 High To the extent that anonymous access to directory data (outside the root DSE...
V-224979 Low The failure to terminate inactive network connections increases the risk of...
V-224980 Medium When inappropriate audit settings are configured for directory service data...
V-224981 Medium When inappropriate audit settings are configured for directory service data...
V-224982 Medium When inappropriate audit settings are configured for directory service data...
V-224983 Medium When inappropriate audit settings are configured for directory service data...
V-224984 Medium When inappropriate audit settings are configured for directory service data...
V-224985 Medium When inappropriate audit settings are configured for directory service data...
V-224986 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224987 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224988 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224989 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224991 Medium Domain controllers are part of the chain of trust for PKI authentications. ...
V-224992 High A PKI implementation depends on the practices established by the Certificat...
V-224993 High A PKI implementation depends on the practices established by the Certificat...
V-224994 Medium Smart cards such as the CAC support a two-factor authentication technique. ...
V-254373 Medium Installation options for applications are typically controlled by administrat...
V-205801 Medium Installation options for applications are typically controlled by administrat...
V-253410 Medium Installation options for applications are typically controlled by administrat...
V-220856 Medium Installation options for applications are typically controlled by administrat...
V-254375 Medium Web-based programs may attempt to install malicious software on a system. Ens...
V-205874 Medium Web-based programs may attempt to install malicious software on a system. Ens...
V-253412 Medium Web-based programs may attempt to install malicious software on a system. Ens...
V-220858 Medium Web-based programs may attempt to install malicious software on a system. Ens...
V-253283 High Attackers are constantly looking for vulnerabilities in systems and applicati...
V-220726 High Attackers are constantly looking for vulnerabilities in systems and applicati...
V-254362 Medium Data Execution Prevention provides additional protection by performing checks...
V-205830 Medium Data Execution Prevention provides additional protection by performing checks...
V-253396 Medium Data Execution Prevention (DEP) provides additional protection by performing ...
V-220837 Medium Data Execution Prevention (DEP) provides additional protection by performing ...
V-254442 Medium To ensure secure DoD websites and DoD-signed code are properly validated, the...
V-205648 Medium To ensure secure DoD websites and DoD-signed code are properly validated, the...
V-253427 Medium To ensure secure DoD websites and DoD-signed code are properly validated, the...
V-220903 Medium To ensure secure DoD websites and DoD-signed code are properly validated, the...
V-254269 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205678 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-254270 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205697 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-254271 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205679 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-254273 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205698 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-253278 Medium The "Telnet Client" is not installed by default. Some protocols and services ...
V-220721 Medium Some protocols and services do not support required security features, such a...
V-254274 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205681 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-253279 Medium The "TFTP Client" is not installed by default. Some protocols and services do...
V-220722 Medium Some protocols and services do not support required security features, such a...
V-254284 Medium Secure Boot is a standard that ensures systems boot only to a trusted operati...
V-205857 Low Secure Boot is a standard that ensures systems boot only to a trusted operati...
V-253257 Medium Secure Boot is a standard that ensures systems boot only to a trusted operati...
V-220700 Low Secure Boot is a standard that ensures systems boot only to a trusted operati...
V-254357 Low Windows Update can obtain updates from additional sources instead of Microsof...
V-205870 Low Windows Update can obtain updates from additional sources instead of Microsof...
V-253394 Low Windows 11 allows Windows Update to obtain updates from additional sources in...
V-220835 Low Windows 10 allows Windows Update to obtain updates from additional sources in...
V-224995 Medium Unsigned network traffic is susceptible to man-in-the-middle attacks, where...
V-224996 Medium Enabling this setting on all domain controllers in a domain prevents domain...
V-224997 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-224998 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-224999 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225000 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225001 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225002 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225003 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-271430 High Weak mappings give rise to security vulnerabilities and demand hardening me...
V-225004 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225005 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225006 Medium The krbtgt account acts as a service account for the Kerberos Key Distribut...
V-225007 High An account that does not have Administrator duties must not have Administra...
V-225008 Medium A compromised local administrator account can provide means for an attacker...
V-225009 Medium The username is one part of logon credentials that could be used to gain ac...
V-225010 Medium Unauthenticated RPC clients may allow anonymous access to sensitive informa...
V-225011 Medium The default Windows configuration caches the last logon credentials for use...
V-225012 High Credential Guard uses virtualization-based security to protect data that co...
V-225013 Medium The Windows Security Account Manager (SAM) stores users' passwords. Restric...
V-225014 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225015 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225016 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225017 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225018 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225019 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225020 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225021 Medium To ensure secure DoD websites and DoD-signed code are properly validated, t...
V-225022 Medium To ensure users do not experience denial of service when performing certifi...
V-225023 Medium To ensure users do not experience denial of service when performing certifi...
V-225024 Medium A system faces an increased vulnerability threat if the built-in guest acco...
V-225025 High An account without a password can allow unauthorized access to a system as ...
V-225026 Medium The built-in administrator account is a well-known account subject to attac...
V-225027 Medium The built-in guest account is a well-known user account on all Windows syst...
V-225028 Medium Maintaining an audit trail of system activity logs can help identify config...
V-225029 Medium Requests sent on the secure channel are authenticated, and sensitive inform...
V-225030 Medium Requests sent on the secure channel are authenticated, and sensitive inform...
V-225031 Medium Requests sent on the secure channel are authenticated, and sensitive inform...
V-225032 Medium Computer account passwords are changed automatically on a regular basis. Di...
V-225033 Medium Computer account passwords are changed automatically on a regular basis. Th...
V-225034 Medium A computer connecting to a domain controller will establish a secure channe...
V-225035 Medium Unattended systems are susceptible to unauthorized use and should be locked...
V-225036 Medium Failure to display the logon banner prior to a logon attempt will negate le...
V-225037 Low Failure to display the logon banner prior to a logon attempt will negate le...
V-225038 Medium Unattended systems are susceptible to unauthorized use and must be locked. ...
V-225039 Medium The server message block (SMB) protocol provides the basis for many network...
V-225040 Medium The server message block (SMB) protocol provides the basis for many network...
V-225041 Medium Some non-Microsoft SMB servers only support unencrypted (plain-text) passwo...
V-225042 Medium The server message block (SMB) protocol provides the basis for many network...
V-225043 Medium The server message block (SMB) protocol provides the basis for many network...
V-225044 High Allowing anonymous SID/Name translation can provide sensitive information f...
V-225045 High Anonymous enumeration of SAM accounts allows anonymous logon users (null se...
V-225046 High Allowing anonymous logon users (null session connections) to list all accou...
V-225047 Medium Access by anonymous users must be restricted. If this setting is enabled, a...
V-225048 High Allowing anonymous access to named pipes or shares provides the potential f...
V-225093 Medium Inappropriate granting of user rights can provide system, administrative, a...