SHARE
TWEET

Untitled




Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
- ####################### CREDENTIAL CACHING #######################
- This script is unable to check Number of Previous Logons to cache, this is because the setting is in the security registry hive, please check the GPO located at Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Interactive Logon
- Do not allow storage of passwords and credentials for network authentication is disabled
- WDigest is not configured
- Virtualisation Based security is enabled
- Secure Boot and DMA Protection is enabled
- Virtualisation Based Protection of Code Integrity with UEFI lock is enabled
- ####################### CONTROLLED FOLDER ACCESS #######################
- Controlled Folder Access for Exploit Guard is not configured
- ####################### CREDENTIAL ENTRY #######################
- Do not display network selection UI is enabled
- Enumerate local users on domain joined computers is enabled
- Do not display the password reveal button is enabled
- Enumerate administrator accounts on elevation is disabled
- Require trusted path for credential entry is not configured
- Disable or enable software Secure Attention Sequence is not configured or disabled
- Sign-in last interactive user automatically after a system-initiated restart is disabled
- Interactive logon: Do not require CTRL+ALT+DEL is disabled
- Interactive logon: Don't display username at sign-in is disabled
- ####################### EARLY LAUNCH ANTI MALWARE #######################
- ELAM Boot-Start Driver Initialization Policy is enabled, but set to Good, Unknown, Bad but critical
- ####################### ELEVATING PRIVILEGES #######################
- Admin Approval Mode for the Built-in Administrator account is not configured
- Allow UIAccess applications to prompt for elevation without using the secure desktop is disabled
- Behavior of the elevation prompt for administrators in Admin Approval Mode is configured, but set to Prompt for consent for non-Windows binaries
- Behavior of the elevation prompt for standard users is configured, but set to Prompt for credentials
- Detect application installations and prompt for elevation is enabled
- Only elevate UIAccess applications that are installed in secure locations is enabled
- Run all administrators in Admin Approval Mode is enabled
- Switch to the secure desktop when prompting for elevation is enabled
- Virtualize file and registry write failures to per-user locations is enabled
- ####################### EXPLOIT PROTECTION #######################
- Prevent users from modifying settings is enabled
- Turn off Data Execution Prevention for Explorer is disabled
- Enabled Structured Exception Handling Overwrite Protection (SEHOP) is enabled
- ####################### LOCAL ADMINISTRATOR ACCOUNTS #######################
- Apply UAC restrictions to local accounts on network logons is not configured
- ####################### MICROSOFT EDGE #######################
- Flash Player is Not Configured
- Edge Developer Tools are Not Configured
- Edge Do Not Track is Not Configured
- Edge Password Manager is Not Configured
- Edge Pop-up Blocker is Not Configured
- Configure Windows Defender SmartScreen is disabled
- Prevent access to the about:flags page in Microsoft Edge is not configured
- Prevent bypassing Windows Defender SmartScreen prompts for sites is enabled in Local Machine GP
- Prevent users and apps from accessing dangerous websites is enabled
- Turn on Windows Defender Application Guard in Enterprise Mode is not configured
- Configure Windows Defender SmartScreen is enabled in Local Machine GP
- Prevent bypassing Windows Defender SmartScreen prompts for sites is enabled in Local Machine GP
- ####################### MULTI-FACTOR AUTHENTICATION #######################
- There are no controls in this section that can be checked by a PowerShell script, this control requires manual auditing
- ####################### OPERATING SYSTEM ARCHITECTURE #######################
- Operating System Architecture is 64-Bit
- ####################### OPERATING SYSTEM PATCHING #######################
- Allow Automatic Updates immediate installation is not configured
- Configure Automatic Updates is enabled
- Do not include drivers with Windows Updates is not configured
- No auto-restart with logged on users for scheduled automatic updates installations is not configured
- Remove access to use all Windows Update features is not configured
- Turn on recommended updates via Automatic Updates is not configured
- Specify intranet Microsoft update service location is not configured
- ####################### PASSWORD POLICY #######################
- Turn off picture password sign-in is enabled
- Turn on convenience PIN sign-in is disabled
- Enforce Password History is set to None which is a compliant setting
- Maximum password age is set to Unlimited which is a non-compliant setting
- Minimum password age is set to 0 which is a compliant setting
- Minimum password length is set to 0 which is a non-compliant setting
- Store passwords using reversible encryption is unable to be checked using PowerShell, as the setting is not a registry key. Please check Computer Configuration\Policies\Administrative Templates\System\Logon
- Limit local account use of blank passwords to console logon only is enabled
- ####################### RESTRICTING PRIVILEGED ACCOUNTS #######################
- There are no controls in this section that can be checked by a PowerShell script, this control requires manual auditing
- ####################### SECURE BOOT #######################
- Secure Boot status was unable to be determined
- ####################### ACCOUNT LOCKOUT POLICIES #######################
- Account Lockout Duration is set to 30 which is a non-compliant setting
- Account Lockout Threshold is set to Never which is a non-compliant setting
- Account Lockout Threshold is set to 30 minutes which is a compliant setting
- ####################### ANONYMOUS CONNECTIONS #######################
- Enable insecure guest logons is disabled
- Allow anonymous SID/Name translation is disabled
- Network access: Do not allow anonymous enumeration of SAM accounts is enabled
- Network access: Do not allow anonymous enumeration of SAM accounts and shares is disabled
- Network access: Let Everyone permissions apply to anonymous users is disabled
- Network access: Restrict anonymous access to Named Pipes and Shares is enabled
- Network access: Do not allow anonymous enumeration of SAM accounts and shares is not configured
- Network security: Allow Local System to use computer identity for NTLM is not configured
- Network security: Allow LocalSystem NULL session fallback is not configured
- Access this computer from the network is unable to be checked using PowerShell, as the setting is not a registry key. Please check Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\. ASD Recommendation is to only have 'Administrators & Remote Desktop Users' present
- Deny Access to this computer from the network is unable to be checked using PowerShell, as the setting is not a registry key. Please check Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\. ASD Recommendation is to only have 'Guests & NT AUTHORITY\Local Account' present
- ####################### ANTI-VIRUS SOFTWARE #######################
- Turn off Windows Defender Antivirus is disabled
- Configure local setting override for reporting to Microsoft Active Protection Service (MAPS). is not configured
- Configure the 'Block at First Sight' feature is not configured
- Join Microsoft Active Protection Service (MAPS). is not configured
- Send file samples when further analysis is required is not configured
- Configure extended cloud check is not configured
- Select cloud protection level is not configured
- Configure local setting override for scanning all downloaded files and attachments is not configured
- Turn off real-time protection is not configured
- Turn on behavior monitoring is not configured
- Turn on process scanning whenever real-time protection is enabled is not configured
- Configure removal of items from Quarantine folder is not configured
- Allow users to pause scan is not configured
- Check for the latest virus and spyware definitions before running a scheduled scan is not configured
- Scan archive files is not configured
- Scan packed executables is not configured
- Scan removable drives is not configured
- Turn on e-mail scanning is not configured
- Turn on heuristics is not configured
- ####################### ATTACHMENT MANAGER #######################
- Do not preserve zone information in file attachments is not configured
- Hide mechanisms to remove zone information is not configured
- ####################### AUDIT EVENT MANAGEMENT #######################
- Include command line in process creation events is disabled
- Specify the maximum log file size (KB) for the Application Log is set to 32769 which is a lower value than 65536 required for compliance
- Specify the maximum log file size (KB) for the Security Log is set to 196609 which is a higher value than 65536 required for compliance
- Specify the maximum log file size (KB) for the System Log is set to 32769 which is a lower value than 65536 required for compliance
- Specify the maximum log file size (KB) for the Setup Log is set to 32769 which is a lower value than 65536 required for compliance
- Manage Auditing and Security Log is unable to be checked using PowerShell, as the setting is not a registry key. Please check Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment. ASD Recommendation is to only have 'Administrators' present
- Audit Credential Validation is unable to be checked using PowerShell, as the setting is not a registry key. Please check Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Logon. ASD Recommendation is to have 'Success and Failure' Present
- Audit Computer Account Management is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit Other Account Management Events is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit Security Group Management is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit User Account Management is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit PNP Activity is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success' Present
- Audit Process Creation is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success' Present
- Audit Process Termination is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success' Present
- Audit Account Lockout is unable to be checked using PowerShell, as the setting is not a registry key. Please check. ASD Recommendation is to have 'Success and Failure' Present
- Audit Group Membership is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success' Present
- Audit Logoff is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success' Present
- Audit Logon is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit Other Logon/Logoff Events is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit Audit Special Logon is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit File Share is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit Kernel Object is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit Other Object Access Events is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit Removable Storage is unable to be checked using PowerShell, as the setting is not a registry key ASD Recommendation is to have 'Success and Failure' Present
- Audit Audit Policy Change is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit Authentication Policy Change is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success' Present
- Audit Authorization Policy Change is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success' Present
- Audit Sensitive Privilege Use is unable to be checked using PowerShell, as the setting is not a registry key. Please check Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Privilege Use. ASD Recommendation is to have 'Success and Failure' Present
- Audit IPsec Driver is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit Other System Events is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit Security State Change is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success' Present
- Audit Security System Extension is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit System Integrity is unable to be checked using PowerShell, as the setting is not a registry key. ASD Recommendation is to have 'Success and Failure' Present
- Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings is not configured
- ####################### AUTOPLAY AND AUTORUN #######################
- Disallow Autoplay for non-volume devices is enabled in Local Machine GP
- Set the default behavior for AutoRun is enabled in Local Machine GP
- Turn off Autoplay is enabled in Local Machine GP
- ####################### BIOS AND UEFI PASSWORDS #######################
- Unable to confirm that a BIOS password is set via PowerShell. Please manually check if a BIOS password is set (if applicable)
- ####################### BOOT DEVICES #######################
- Unable to confirm the BIOS device boot order. Please manually check to ensure that the hard disk of this device is the primary boot device and the machine is unable to be booted off removable media (if applicable)
- ####################### BRIDGING NETWORKS #######################
- Prohibit installation and configuration of Network Bridge on your DNS domain network is enabled
- Route all traffic through the internal network is not configured
- Prohibit connection to non-domain networks when connected to domain authenticated network is enabled
- ####################### BUILT-IN GUEST ACCOUNTS #######################
- The local guest account is disabled
- Deny Logon Locally is unable to be checked realiably using PowerShell. Please check Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment. ASD Recommendation is to have 'Guests' present.
- ####################### CASE LOCKS #######################
- Unable to check if this computer has a physical case lock with a PowerShell script! Ensure the physical workstation is secured to prevent tampering, such as adding / removing hardware or removing CMOS battery.
- ####################### CD BURNER ACCESS #######################
- Remove CD Burning features is not configured
- ####################### CENTRALISED AUDIT EVENT LOGGING #######################
- Centralised Audit Event Logging is unable to be checked with PowerShell. Ensure the organisation is using Centralised Event Logging, please confirm events from endpoint computers are being sent to a central location.
- ####################### COMMAND PROMPT #######################
- Prevent access to the command prompt is not configured
- ####################### DIRECT MEMORY ACCESS #######################
- Prevent installation of devices that match any of these device IDs is enabled
- Prevent installation of devices that match any of these device IDs (retroactively) is enabled
- PCI\CC_0C0A is included on the banned device list to prevent DMA installations
- Prevent installation of devices using drivers that match these device setup classes is enabled
- Prevent installation of devices using drivers that match these device setup classes (retroactively) is enabled
- {d48179be-ec20-11d1-b6b8-00c04fa372a7} is not included on the banned device list to prevent DMA installations.
- ####################### ENDPOINT DEVICE CONTROL #######################
- All Removable Storage classes: Deny all access is not configured in local machine group policy
- All Removable Storage classes: Deny all access is not configured in user group policy
- CD and DVD: Deny execute access is not configured in local machine group policy
- CD and DVD: Deny read access is not configured in local machine group policy
- CD and DVD: Deny write access is not configured in local machine group policy
- CD and DVD: Deny read access is not configured in user group policy
- CD and DVD: Deny write access is not configured in user group policy
- Custom Classes: Deny read access is not configured in local machine group policy
- Custom Classes: Deny write access is not configured in local machine group policy
- Custom Classes: Deny read access is not configured in user group policy
- Custom Classes: Deny write access is not configured in user group policy
- Floppy Drives: Deny execute access is not configured in local machine group policy
- Floppy Drives: Deny read access is not configured in local machine group policy
- Floppy Drives: Deny write access is not configured in local machine group policy
- Floppy Drives: Deny read access is not configured in user group policy
- Floppy Drives: Deny write access is not configured in user group policy
- Removable Disks: Deny execute access is not configured in local machine group policy
- Removable Disks: Deny read access is not configured in local machine group policy
- Removable Disks: Deny write access is not configured in local machine group policy
- Removable Disks: Deny read access is not configured in user group policy
- Removable Disks: Deny write access is not configured in user group policy
- Tape Drives: Deny execute access is not configured in local machine group policy
- Tape Drives: Deny read access is not configured in user group policy
- Tape Drives: Deny write access is not configured in user group policy
- Tape Drives: Deny read access is not configured in local machine group policy
- Tape Drives: Deny write access is not configured in local machine group policy
- WPD Devices: Deny read access is not configured in local machine group policy
- WPD Devices: Deny write access is not configured in local machine group policy
- WPD Devices: Deny read access is not configured in user group policy
- WPD Devices: Deny write access is not configured in user group policy
- ####################### FILE AND PRINT SHARING #######################
- Prevent the computer from joining a homegroup is enabled
- Prevent users from sharing files within their profile is not configured
- ####################### GROUP POLICY PROCESSING #######################
- Hardened UNC Paths are not configured, disabled or no paths are defined
- Configure registry policy processing is enabled
- Configure security policy processing is not configured
- Turn off background refresh of Group Policy is not configured
- Turn off Local Group Policy Objects processing is not configured
- ####################### HARD DRIVE ENCRYPTION #######################
- Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) is not configured or disabled
- Disable new DMA devices when this computer is locked is not configured
- Prevent memory overwrite on restart is not configured
- Choose how BitLocker-protected fixed drives can be recovered has been configured
- Configure use of passwords for fixed data drives has been configured
- Passwords required for fixed data drives is disabled
- Bitlocker Minimum passphrase length is set to which is less than the minimum requirement of 10 characters
- Deny write access to fixed drives not protected by BitLocker is not configured
- Enforce drive encryption type on fixed data drive is not configured
- Allow devices compliant with InstantGo or HSTI to opt out of pre-boot PIN is not configured
- Allow enhanced PINs for startup is enabled
- Allow network unlock at startup is not configured
- Allow Secure Boot for integrity validation is enabled
- Choose how BitLocker-protected operating system drives can be recovered has been configured
- Configure minimum PIN length for startup is not configured
- Configure use of passwords for operating system drives has been configured
- Passwords required for operating system drives is disabled
- Bitlocker Minimum passphrase length is set to which is less than the minimum requirement of 10 characters
- Disallow standard users from changing the PIN or password is not configured
- Enforce drive encryption type on operating system drive is not configured
- Require additional authentication at startup is not configured
- Reset platform validation data after BitLocker recovery is not configured
- Choose how BitLocker-protected removable drives can be recovered has been configured
- Configure use of passwords for removable drives has been configured
- Passwords required for removable drives is disabled
- Bitlocker Minimum passphrase length is set to which is less than the minimum requirement of 10 characters
- Control use of bitlocker on removable drives is not configured
- Deny write access to removable drives not protected by BitLocker is enabled
- Enforce drive encryption type on removable data drive is not configured
- ####################### INSTALLING APPLICATIONS #######################
- Configure Windows Defender SmartScreen is disabled
- Allow user control over installs is disabled
- Always install with elevated privileges is disabled in local machine policy
- Always install with elevated privileges is not configured in user policy
- ####################### INTERNET PRINTING #######################
- Turn off downloading of print drivers over HTTP is not configured
- Turn off printing over HTTP is enabled
- ####################### LEGACY AND RUN ONCE LISTS #######################
- Do not process the legacy run list is not configured
- Do not process the run once list is not configured
- Run These Programs At User Logon is disabled, no run keys are set
- ####################### MICROSOFT ACCOUNTS #######################
- Block all consumer Microsoft account user authentication is enabled
- Prevent the usage of OneDrive for file storage is enabled
- This setting is unable to be checked with PowerShell as it is a registry key, please manually check Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options
- ####################### MSS SETTINGS #######################
- MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) is not configured
- MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) is not configured
- MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes is not configured
- MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers is not configured
- ####################### NETBIOS OVER TCP/IP #######################
- NetBIOS Over TCP/IP service is running, NetBIOS over TCP/IP is likely enabled
- ####################### NETWORK AUTHENTICATION #######################
- Network security: Configure encryption types allowed for Kerberos is not configured
- Network security: LAN Manager authentication level is not configured
- Network security: Minimum session security for NTLM SSP based (including secure RPC) clients is configured with a non-compliant setting, it must be set to Require NTLMv2 session security and Require 128-bit encryption
- Network security: Minimum session security for NTLM SSP based (including secure RPC) servers is configured with a non-compliant setting, it must be set to Require NTLMv2 session security and Require 128-bit encryption
- ####################### NOLM HASH POLICY #######################
- Network security: Do not store LAN Manager hash value on next password change is enabled
- ####################### OPERATING SYSTEM FUNCTIONALITY #######################
- There are 203 services present on this machine, however only 27 have been disabled. This indicates that no functionality reduction, or a minimal level of functionality reduction has been applied to this machine.
- ####################### POWER MANAGEMENT #######################
- Allow standby states (S1-S3) when sleeping (on battery) is disabled
- Allow standby states (S1-S3) when sleeping (plugged in) is disabled
- Require a password when a computer wakes (on battery) is enabled
- Require a password when a computer wakes (plugged in) is enabled
- Specify the system hibernate timeout (on battery) is not configured
- Specify the system hibernate timeout (plugged in) is not configured
- Specify the system sleep timeout (on battery) is not configured
- Specify the system sleep timeout (plugged in) is not configured
- Specify the unattended sleep timeout (on battery) is not configured
- Specify the unattended sleep timeout (plugged in) is not configured
- Turn off hybrid sleep (on battery) is not configured
- Turn off hybrid sleep (plugged in) is not configured
- Show hibernate in the power options menu is not configured
- Show sleep in the power options menu is not configured
- ####################### POWERSHELL #######################
- Turn on PowerShell Script Block Logging is disabled in Local Machine GP
- Turn on PowerShell Script Block Invocation Logging is not configured
- Turn on Script Execution is not configured
- Script Execution is not configured
- ####################### REGISTRY EDITING TOOLS #######################
- Prevent access to registry editing tools is not configured
- ####################### REMOTE ASSISTANCE #######################
- Configure Offer Remote Assistance is disabled
- Configure Solicited Remote Assistance is disabled
- ####################### REMOTE DESKTOP SERVICES #######################
- Allow users to connect remotely by using Remote Desktop Services is not configured
- No members are allowed to logon through remote desktop services, this setting is compliant
- Unable to check members of deny logon through remote desktop services at this time please manually check Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny Logon through Remote Desktop Services and ensure 'Administrators' 'Guests' and 'NT Authority\Local Account' are members
- Remote host allows delegation of non-exportable credentials is enabled
- Configure server authentication for client is not configured
- Do not allow passwords to be saved is enabled
- Deny logoff of an administrator logged in to the console session is not configured
- Do not allow Clipboard redirection is not configured
- Do not allow drive redirection is enabled
- Always prompt for password upon connection is enabled
- Do not allow local administrators to customize permissions is not configured
- Require secure RPC communication is enabled
- Require use of specific security layer for remote (RDP) connections is set to SSL
- Require user authentication for remote connections by using Network Level Authentication is enabled
- Set client connection encryption level is set to high
- ####################### REMOTE PROCEDURE CALL #######################
- Restrict Unauthenticated RPC clients is enabled
- ####################### REPORTING SYSTEM INFORMATION #######################
- Microsoft Support Diagnostic Tool: Turn on MSDT interactive communication with support provider is disabled
- Turn off Inventory Collector is not configured
- Turn off Steps Recorder is not configured
- Allow Telemetry is enabled in Local Machine GP
- Configure Corporate Windows Error Reporting is not configured
- Connect using SSL is not configured
- ####################### SAFE MODE #######################
- Block Non-Administrators in Safe Mode not configured
- ####################### SECURE CHANNEL COMMUNICATIONS #######################
- Domain member: Digitally encrypt or sign secure channel data (always) is enabled
- Domain member: Digitally encrypt secure channel data (when possible) is enabled
- Domain member: Digitally sign secure channel data (when possible) is enabled
- Domain member: Require strong (Windows 2000 or later) session key is enabled
- ####################### SECURITY POLICIES #######################
- Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid services is disabled
- Turn off Microsoft consumer experiences is enabled
- Turn off heap termination on corruption is disabled
- Turn off shell protocol protected mode is disabled
- Prevent downloading of enclosures is enabled in Local Machine GP
- Allow indexing of encrypted files is disabled
- Enables or disables Windows Game Recording and Broadcasting is not configured
- Domain member: Disable machine account password changes is disabled
- Domain member: Maximum machine account password age is set to a compliant setting
- Network security: Allow PKU2U authentication requests to this computer to use online identities is not configured
- Unable to check Network security: Force logoff when logon hours expire because it is not a registry setting. Please manually check Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options and ensure this is set to enabled.
- Network security: LDAP client signing requirements is enabled and set to Negotiate Signing
- System objects: Require case insensitivity for non-Windows subsystems is enabled
- System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) is enabled
- ####################### SERVER MESSAGE BLOCK SESSIONS #######################
- Configure SMB v1 client driver is not configured
- Configure SMB v1 server is not configured
- Microsoft Network Client: Digitally sign communications (always) is disabled
- Microsoft network client: Digitally sign communications (if server agrees) is enabled
- Microsoft network client: Send unencrypted password to third-party SMB servers is disabled
- Microsoft network server: Amount of idle time required before suspending session is less than or equal to 15 mins
- Microsoft network server: Digitally sign communications (always) is disabled
- Microsoft network server: Digitally sign communications (if client agrees) is disabled
- ####################### SESSION LOCKING #######################
- Prevent enabling lock screen camera is enabled
- Prevent enabling lock screen slide show is enabled
- Allow users to select when a password is required when resuming from connected standby is not configured
- Turn off app notifications on the lock screen is enabled
- Show lock in the user tile menu is not configured
- Allow Windows Ink Workspace is on but dissalow access above lock
- No inactivity timeout has been configured
- Enable screen saver is not configured
- Password protect the screen saver is not configured
- Screen saver timeout is not configured
- Turn off toast notifications on the lock screen is not configured
- Do not suggest third-party content in Windows spotlight is not configured
- ####################### SOFTWARE-BASED FIREWALLS #######################
- Unable to confirm if an effective, application based software firewall is in use on this endpoint. Please confirm that a software firewall is in use on this host, listing explicitly which applications can generate inbound and outbound network traffic.
- ####################### SOUND RECORDER #######################
- Do not allow Sound Recorder to run is not configured
- ####################### STANDARD OPERATING ENVIRONMENT #######################
- This script is unable to check if a Standard Operating Environment (SOE) was used to build this image. Please manually confirm if the computer was built using a SOE image process
- ####################### SYSTEM BACKUP AND RESTORE #######################
- Unable to check Backup Files and Directories setting at this time, please check manually Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Backup Files and Directories. Only Administrators should be members of this setting
- Unable to check Restore Files and Directories setting at this time, please check manually Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Restore Files and Directories. Only Administrators should be members of this setting
- ####################### SYSTEM CRYPTOGRAPHY #######################
- System cryptography: Force strong key protection for user keys stored on the computer is not configured
- Use FIPS compliant algorithms for encryption, hashing and signing is not configured
- ####################### USER RIGHTS POLICIES #######################
- Unable to check this chapter as it requires a GPO export to view the settings (they are not stored locally). Please check policies located at 'Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment'
- ####################### VIRTUALISED WEB AND EMAIL ACCESS #######################
- This machine was detected to be a physical machine, if this machine is used to browse the web and check e-mail, you are non compliant with this chapter of the guide
- ####################### WINDOWS REMOTE MANAGEMENT #######################
- Allow Basic authentication is not configured
- Allow unencrypted traffic is not configured
- Disallow Digest authentication is not configured
- Allow Basic authentication is not configured
- Allow unencrypted traffic is not configured
- Disallow WinRM from storing RunAs credentials is not configured
- ####################### WINDOWS REMOTE SHELL ACCESS #######################
- Allow Remote Shell Access is disabled
- ####################### WINDOWS SEARCH AND CORTANA #######################
- Allow Cortana is disabled
- Don't search the web or display web results in Search is not configured
- ####################### WINDOWS TO GO #######################
- Windows To Go Default Startup Options is not configured
- ####################### DISPLAYING FILE EXTENSIONS #######################
- Display file extensions is enabled
- ####################### FILE AND FOLDER SECURITY PROPERTIES #######################
- Remove Security tab is not configured
- ####################### LOCATION AWARENESS #######################
- Turn off location is enabled
- Turn off location scripting is not configured
- Turn off Windows Location Provider is enabled
- ####################### MICROSOFT STORE #######################
- Turn off access to the Store is not configured
- Turn off the Store application is not configured
- ####################### PUBLISHING INFORMATION TO THE WEB #######################
- Turn off Internet download for Web publishing and online ordering wizards is enabled
- ####################### RESULTANT SET OF POLICY REPORTING #######################
- Determine if interactive users can generate Resultant Set of Policy data is not configured
- ####################### #######################
- Out of a total of 346 controls checked there were:
- 113 compliant settings
- 153 Not-Configured (therefore treated as Non-Compliant) settings
- 36 Non-Compliant settings
- 47 settings that were unable to be checked due to various limitations
- Press Enter to continue...:
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy.