nessus report - tenable network security

228
Nessus Report Report 24/Feb/2012:17:48:03 GMT

Upload: others

Post on 12-Sep-2021

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Nessus Report - Tenable Network Security

Nessus ReportReport

24/Feb/2012:17:48:03 GMT

Page 2: Nessus Report - Tenable Network Security

Table Of ContentsCompliance 'FAILED'............................................................................................................9

•2.1.1 Minimum Password Length: at least 8 characters...........................................................................................10

•2.2.1.1 Audit Account Logon Events: Success and Failure......................................................................................11

•2.2.1.2 Audit Account Managemement: Success and Failure..................................................................................12

•2.2.1.4 Audit Logon Events: Success and Failure....................................................................................................13

•2.2.1.5 Audit Object Access: Failure (minimum)...................................................................................................... 14

•2.2.1.6 Audit Policy Change: Success and Failure.................................................................................................. 15

•2.2.1.7 Audit Privilege Use: Failure (minimum)........................................................................................................ 16

•2.2.1.9 Audit System Events: Success and Failure..................................................................................................17

•2.2.2.1 Minimum Password Age: 1 day....................................................................................................................18

•2.2.2.3 Minimum Password Length: 8 characters.................................................................................................... 19

•2.2.2.4 Password Complexity: Enabled.................................................................................................................... 20

•2.2.2.5 Password History: 24 Passwords Remembered.......................................................................................... 21

•2.2.3.2 Account Lockout Threshold: 3 Bad Logon Attempts.................................................................................... 22

•2.2.4.1.1 Maximum Event Log Size (Application): 80Mb..........................................................................................23

•2.2.4.1.3 Log Retention Method (Application): Overwrite Events As Needed.......................................................... 24

•2.2.4.2.1 Maximum Event Log Size (Security): 80Mb.............................................................................................. 25

•2.2.4.2.3 Log Retention Method (Security): Overwrite Events As Needed...............................................................26

•2.2.4.3.1 Maximum Event Log Size (System): 80Mb............................................................................................... 27

•2.2.4.3.3 Log Retention Method (System): Overwrite Events As Needed................................................................28

•3.1.1 Additional Restrictions for Anonymous Connections: No Access Without Explicit AnonymousPermissions................................................................................................................................................................. 29

•3.2.1.2 Allow System to be Shut Down Without Having to Log On: Disabled..........................................................30

•3.2.1.9 Clear Virtual Memory Pagefile When System Shuts Down: Enabled...........................................................31

•3.2.1.13 Digitally Sign Server Communication (When Possible): Enabled...............................................................32

•3.2.1.15 Do Not Display Last User Name in Logon Screen: Enabled......................................................................33

•3.2.1.16 LAN Manager Authentication Level: 'Send NTLMv2 response only'.......................................................... 34

•3.2.1.17 Message Text for Users Attempting to Log On: Custom Message or ....................................................... 35

•3.2.1.18 Message Title for Users Attempting to Log On: Warning: or custom title...................................................36

•3.2.1.19 Number of Previous Logons to Cache: 0................................................................................................... 37

•3.2.1.21 Prevent Users from Installing Printer Drivers: Enabled.............................................................................. 38

•3.2.1.25 Rename Administrator Account: Anything but Administrator......................................................................39

•3.2.1.26 Rename Guest Account: Any value other than Guest................................................................................40

•3.2.1.28 Restrict Floppy Access to Locally Logged-On User Only: Enabled............................................................41

•3.2.1.35 Smart Card Removal Behavior: Lock Workstation (minimum) .................................................................. 42

•3.2.1.38 Unsigned Non-Driver Installation Behavior: Warn, but allow installation (minimum) or Do Not AllowInstallation....................................................................................................................................................................43

•3.2.2.1 Suppress Dr. Watson Crash Dumps: HKLM\Software\Microsoft\DrWatson\CreateCrashDump: 0...............44

•3.2.2.2 Disable Automatic Execution of the System Debugger: HKLM\Software\Microsoft\Windows NT\CurrentVersion\AEDebug\Auto: 0...............................................................................................................................45

•3.2.2.7 Disable automatic reboots after a Blue Screen of Death: HKLM\System\CurrentControlSet\Control\CrashControl: 0.......................................................................................................................................................... 46

•3.2.2.8 Disabled CD Autorun: HKLM\System\CurrentControlSet\Services\CDrom\Autorun: 0................................. 47

•3.2.2.13 Ensure ICMP Routing via shortest path first: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\EnableICMPRedirect: 0..............................................................................................................................................48

Page 3: Nessus Report - Tenable Network Security

•4.1 Available Servcies (MSFtpsvc): Permissions on FTP Publishing Service: Administrators: Full Control; System:Read, Start, Stop, and Pause.....................................................................................................................................49

•4.1 Available Services (Alerter): Permissions on Alerter: Administrators: Full Control; System: Read, Start, Stop,and Pause................................................................................................................................................................... 50

•4.1 Available Services (Browser): Permissions on Computer Browser: Administrators: Full Control; System: Read,Start, Stop, and Pause................................................................................................................................................51

•4.1 Available Services (ClipSrv): Permissions on Clipbook: Administrators: Full Control; System: Read, Start, Stop,and Pause................................................................................................................................................................... 52

•4.1 Available Services (FAX): Permissions on Fax Service: Administrators: Full Control: System; Read, Start, Stop,and Pause................................................................................................................................................................... 53

•4.1 Available Services (IISADMIN): Permissions on IIS Admin Services: Administrators: Full Control; System:Read, Start, Stop, and Pause.....................................................................................................................................54

•4.1 Available Services (Messenger): Permissions on Messenger: Administrators: Full Control; System: Read, Start,Stop, and Pause......................................................................................................................................................... 55

•4.1 Available Services (RemoteAccess): Permissions on Routing and Remote Access: Administrators: Full Control;System: Read, Start, Stop, Pause..............................................................................................................................56

•4.1 Available Services (RemoteRegistry): Permissions on Remote Registry Service: Administrators: Full Control;System: Read, Start, Stop, and Pause.......................................................................................................................57

•4.1 Available Services (SMTPSVC): Permissions on SMTP: Administrators: Full Control; System: Read, Start,Stop, Pause.................................................................................................................................................................58

•4.1 Available Services (SharedAccess): Permissions on Internet Connection Sharing: Administrators: Full Control;System: Read, Start, Stop, and Pause.......................................................................................................................59

•4.1 Available Services (TlntSvr): Permissions on Telnet: Administrators: Full Control; System: Read, Start, Stop,and Pause................................................................................................................................................................... 60

•4.1 Available Services (W3SVC): Permissions on World Wide Web Publishing Service: Administrators: Full Control;System: Read, Start, Stop, and Pause.......................................................................................................................61

•4.1 Available Services (mnmsrvc): Permissions on NetMeeting Remote Desktop Sharing: Administrators: FullControl; System: Read, Start, Stop, and Pause.........................................................................................................62

•4.1.1 Alerter (Alerter): Disabled................................................................................................................................ 63

•4.1.2 Clipbook (ClipSrv): Disabled............................................................................................................................ 64

•4.1.3 Computer Browser (Browser): Disabled.......................................................................................................... 65

•4.1.4 Fax Service (FAX): Disabled........................................................................................................................... 66

•4.1.5 FTP Publishing Service (MSFtpsvc): Disabled (Warning: This will disable FTP Servers)............................... 67

•4.1.6 IIS Admin Service (IISADMIN): Disabled (Warning: This will disable Internet Information Services)...............68

•4.1.7 Internet Connection Sharing (SharedAccess): Disabled..................................................................................69

•4.1.8 Messenger (Messenger): Disabled.................................................................................................................. 70

•4.1.9 NetMeeting Remote Desktop Sharing (mnmsrvc): Disabled........................................................................... 71

•4.1.10 Remote Registry Service (RemoteRegistry): Disabled..................................................................................72

•4.1.12 Simple Mail Transfer Protocol (SMTP) (SMTPSVC): Disabled (Warning: This will disable certain functions onSMTP/IIS Servers!)......................................................................................................................................................73

•4.1.15 Telnet (TlntSvr): Disabled.............................................................................................................................. 74

•4.1.16 World Wide Web Publishing Services (W3SVC): Disabled (Warning: This will disable Internet InformationServices!).....................................................................................................................................................................75

•4.2.1 Access this computer from the network (SeNetworkLogonRight): Users, Administrators (or none)................ 76

•4.2.4 Back up files and directories (SeBackupPrivilege): Administrators................................................................. 77

•4.2.5 Bypass travrse checking (SeChangeNotifyPrivilege): Users........................................................................... 78

•4.2.6 Change the system time (SeSystemTimePrivilege): Administrators................................................................79

•4.2.10 Debug programs (SeDebugPrivilege): None................................................................................................. 80

•4.2.11 Deny access to this computer from the network (SeDenyNetworkLogonRight): Guests............................... 81

•4.2.24 Log on locally (SeInteractiveLogonRight): Administrators............................................................................. 82

•4.2.27 Profile single process (SeProfileSingleProcessPrivilege): Administrators..................................................... 83

•4.2.29 Remove computer from docking station (SeUndockPrivilege): Administrators..............................................84

Page 4: Nessus Report - Tenable Network Security

•4.2.31 Restore files and directories (SeRestorePrivilege): Administrators............................................................... 85

•4.2.32 Shut down the system (SeShutdownPrivilege): Administrators.....................................................................86

•4.4.1.1 %SystemDrive%\ - Administrators: Full; System: Full; Creator Owner: Full; Users: Read and Execute,List............................................................................................................................................................................... 87

•4.4.1.2 %SystemDrive%\autoexec.bat: Administrators: Full; System: Full............................................................... 88

•4.4.1.3 %SystemDrive%\boot.ini - Administrators: Full; System: Full.......................................................................89

•4.4.1.4 %SystemDrive%\config.sys - Administrators: Full; System: Full.................................................................. 90

•4.4.1.5 %SystemDrive%\io.sys - Administrators: Full; System: Full......................................................................... 91

•4.4.1.6 %SystemDrive%\msdos.sys - Administrators: Full; System: Full................................................................. 92

•4.4.1.8 %SystemDrive%\ntdetect.com - Administrators: Full; System: Full..............................................................93

•4.4.1.9 %SystemDrive%\ntldr - Administrators: Full; System: Full........................................................................... 94

•4.4.1.10 %SystemDrive%\Documents and Settings - Administrators: Full; System: Full; Creater Owner: Full; Users:Read and Execute, List...............................................................................................................................................95

•4.4.1.11 %SystemDrive%\Documents and Settings\Administrator - Administrators: Full; System: Full....................96

•4.4.1.12 %SystemDrive%\Documents and Settings\All Users - Administrators: Full; System: Full; Creater Owner:Full; Users: Read and Execute, List...........................................................................................................................97

•4.4.1.14 %SystemDrive%\Documents and Settings\Default User - Administrators: Full; System: Full; Users: Read &Execute, List................................................................................................................................................................98

•4.4.1.17 %ProgramFiles% - Administrators: Full; System: Full; Creater Owner: Full; Users: Read and Execute,List............................................................................................................................................................................... 99

•4.4.1.19 %SystemRoot% - Administrators: Full; System: Full; Creater Owner: Full; Users: Read and Execute,List............................................................................................................................................................................. 100

•4.4.1.21 %SystemRoote%\CSC - Administrators: Full; System: Full......................................................................101

•4.4.1.22 %SystemRoot%\Debug - Administrators: Full; System: Full; Creater Owner: Full; Users: Read andExecute, List..............................................................................................................................................................102

•4.4.1.23 %SystemRoot%\Debug\UserMode - Administrators: Full; System: Full; Users (This folder, only): TraverseFolders/Execute Files, List folder/Read data, Create files/Write data; Users (Files only): Create Files/Write Data;Create folders/Append data...................................................................................................................................... 103

•4.4.1.25 %SystemRoot%\Registration - Administrators: Full; System: Full; Users: Read...................................... 104

•4.4.1.26 %SystemRoot%\repair - Administrators: Full; System: Full......................................................................105

•4.4.1.27 %SystemRoot%\security - Administrators: Full; System: Full; Creater Owner: Full..................................106

•4.4.1.28 %SystemRoot%\system32 - Administrators: Full; System: Full; Creater Owner: Full; Users: Read andExecute, List..............................................................................................................................................................107

•4.4.1.29 %SystemRoot%\system32\at.exe - Administrators: Full; System: Full..................................................... 108

•4.4.1.30 %SystemRoot%\system32\Ntbackup.exe - Administrators: Full; System: Full......................................... 109

•4.4.1.31 %SystemRoot%\system32\rcp.exe - Administrators: Full; System: Full................................................... 110

•4.4.1.32 %SystemRoot%\regedit.exe - Administrators: Full; System: Full............................................................. 111

•4.4.1.33 %SystemRoot%\system32\regedt32.exe - Administrators: Full; System: Full.......................................... 112

•4.4.1.34 %SystemRoot%\system32\rexec.exe - Administrators: Full; System: Full............................................... 113

•4.4.1.35 %SystemRoot%\system32\rsh.exe - Administrators: Full; System: Full................................................... 114

•4.4.1.36 %SystemRoot%\system32\secedit.exe - Administrators: Full; System: Full.............................................115

•4.4.1.38 %SystemRoot%\config - Administrators: Full; System: Full......................................................................116

•4.4.1.40 %SystemRoot%\system32\DTCLog - Administrators: Full; System: Full; Users: Read and Execute,List............................................................................................................................................................................. 117

•4.4.1.43 %SystemRoot%\system32\NTMSData - Administrators: Full; System: Full............................................. 118

•4.4.1.45 %SystemRoot%\system32\Setup - Admininstrators: Full; System: Full; Users: Read and Execute,List............................................................................................................................................................................. 119

•4.4.1.46 %SystemRoot%\system32\spool\printers - Administrators: Full; System: Full; Creater Owner: Full; Users:Traverse Folder/Execute file, Read, Read Extended Attributes, Create folders, Append Data................................ 120

•4.4.1.48 %SystemRoot%\Temp - Administrators: Full; System: Full; Creater Owner: Full; Users: Traverse Folders/Execute Files, Create Files/Write Data, Create Folders/Append Data.....................................................................121

Page 5: Nessus Report - Tenable Network Security

•4.4.2.1 HKLM\Software\Classes - Administrators: Full; System: Full; Creater Owner: Full; Users: Read...............122

•4.4.2.2 HKLM\Software - Administrators: Full; System: Full; Creater Owner: Full; Users: Read............................123

•4.4.2.3 HKLM\Software\Microsoft\NetDDE - Administrators: Full; System: Full..................................................... 124

•4.4.2.4 HKLM\Software\Microsoft\OS/2 Subsystem for NT - Administrators: Full System: FUll; Creater Owner:Full............................................................................................................................................................................. 125

•4.4.2.5 HKLM\Software\Microsoft\Windows NT\CurrentVersion\AsrCommands - Administrators: Full; System: Full;Creater Owner: Full; Users: Read; Backup Operators (this key and subkeys): Query Value, Set Value, CreateSubkey, Enumerate Subkeys, Notify, Delete, Read................................................................................................. 126

•4.4.2.8 HKLM\Software\Microsoft\Windows\CurrentVersion\Installer - Administrators: Full; System: Full; Users:Read.......................................................................................................................................................................... 127

•4.4.2.10 HKLM\System - Administrators: Full; System: Full; Creater Owner: Full; Users: Read............................ 128

•4.4.2.12 HKLM\System\ControlSet001 - Administrators: Full; System: Full; Creater Owner: Full; Users: Read.....129

•4.4.2.13 HKLM\System\ControlSet002 - Administrators: Full; System: Full; Creater Owner: Full; Users: Read.....130

•4.4.2.14 HKLM\System\CurrentControlSet\Control\SecurePipeServers\WinReg - Administrators: Full; System: Full;Backup Operators: Query Value, Enumerate Subkeys, Notify, Read Permissions.................................................. 131

•4.4.2.15 HKLM\System\CurrentControlSet\Control\WMI\Security - Administrators: Full; System: Full; Creater Owner(this key and subkeys): Full......................................................................................................................................132

•4.4.2.17 HKLM\System\CurrentControlSet\Hardware Profiles - Administrators: Full; System: Full; Creater Owner:Full; Users: Read...................................................................................................................................................... 133

•4.4.2.20 HKU\.Default - Administrators: Full; System: Full; Creater Owner: Full; Users: Read.............................. 134

•4.4.2.21 HKU\.Default\Software\Microsoft\NetDDE.................................................................................................135

•4.4.3.1 %SystemDrive% - Everyone: Failures (this folder, propagate inheritable permissions to all subfolders)....136

•4.4.3.2 HKLM\Software - Everyone: Failures (this key, propagate inheritable permissions to all subfolders).........137

•4.4.3.3 HKLM\System - Everyone: Failures (this key, propagate inheritable permissions to all subfolders)...........138

Compliance 'SKIPPED'.....................................................................................................139

Compliance 'PASSED'......................................................................................................140

•2.1.2 Maximum Password Age: no more than 90 days old....................................................................................141

•2.2.2.2 Maximum Password Age: 90 days............................................................................................................. 142

•2.2.2.6 Store Passwords using Reversible Encryption: Disabled........................................................................... 143

•2.2.3.1 Account Lockout Duration: 15 minutes.......................................................................................................144

•2.2.3.3 Reset Account Lockout After: 15 Minutes.................................................................................................. 145

•3.2.1.3 Allowed to Eject Removable NTFS Media: Administrators.........................................................................146

•3.2.1.4 Amount of Idle Time Required Before Disconnecting Session: 30 Minutes............................................... 147

•3.2.1.7 Automatically Log Off Users When Logon Time Expires: Enabled............................................................ 148

•3.2.1.11 Digitally Sign Client Communication (When Possible): Enabled.............................................................. 149

•3.2.1.20 Prevent System Maintenance of Computer Account Password: Disabled............................................... 150

•3.2.1.22 Prompt User to Change Password Before Expiration: 14 days................................................................151

•3.2.1.23 Recovery Console: Allow Automatic Administrative Logon: Disabled...................................................... 152

•3.2.1.24 Recover Console: Allow Floppy Copy and Access to All Drives and All Folders: Disabled...................... 153

•3.2.1.30 Secure Channel: Digitally Encrypt Secure Channel Data (When Possible): Enabled...............................154

•3.2.1.31 Secure Channel: Digitally Sign Secure Channel Data (When Possible): Enabled....................................155

•3.2.1.33 Send Unencrypted Password to Connect to Third-Part SMB Servers: Disabled......................................156

•3.2.1.36 Strengthen Default Permissions of Global System Objects (i.e. Symbolic Links): Enabled......................157

•3.2.1.37 Unsigned Driver Installation Behavior: Warn, but allow installation (minimum) or Do Not AllowInstallation..................................................................................................................................................................158

•3.2.2.4 Disable Automatic Logon: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\AutoAdminLogon: 0..................................................................................................................................................159

•3.2.2.21 Enable IPSec to protect Kerberos RSVP Traffic: HKLM\System\CurrentControlSet\Services\IPSEC\NoDefaultExempt: 1................................................................................................................................................. 160

Page 6: Nessus Report - Tenable Network Security

•4.1 Available Services (SNMP): Permissions on SNMP: Administrators: Full Control; System: Read, Start, Stop,and Pause................................................................................................................................................................. 161

•4.1 Available Services (SNMPTRAP): Permissions on SNMP Trap: Administrators: Full Control; Sytem: Read,Start, Stop, and Pause..............................................................................................................................................162

•4.1.11 Routing and Remote Access (RemoteAccess): Disabled............................................................................163

•4.1.13 Simple Network Management Protocol (SNMP) Service: Disabled.............................................................164

•4.1.14 Simple Network Management Protocol (SNMP) Trap (SNMPTRAP): Disabled.......................................... 165

•4.2.2 Act as part of the operating system (SeTcbPrivilege): None........................................................................ 166

•4.2.7 Create a pagefile (SeCreatePagefilePrivilege): Administrators..................................................................... 167

•4.2.8 Create a token object (SeCreateTokenPrivilege): None................................................................................168

•4.2.9 Create permanent shared objects (SeCreatePermanentPrivilege): None..................................................... 169

•4.2.16 Force shutdown from a remote system (SeRemoteShutdownPrivilege): Administrators.............................170

•4.2.17 Generate security audits (SeAuditPrivilege): None..................................................................................... 171

•4.2.18 Increase quotas: Administrators.................................................................................................................. 172

•4.2.19 Increase schedulign priority (SeIncreaseBasePriorityPrivilege): Administrators..........................................173

•4.2.20 Load and unload device drivers (SeLoadDriverPrivilege): Administrators...................................................174

•4.2.21 Lock pages in memory (SeLockMemoryPrivilege): None............................................................................175

•4.2.25 Manage auditing and security log (SeSecurityPrivilege): Administrators.....................................................176

•4.2.26 Modify firmware environment values (SeSystemEnvironmentPrivilege): Administrators............................. 177

•4.2.28 Profile system performance (SeSystemProfilePrivilege): Administrators.....................................................178

•4.2.30 Replace a process level token (SeAssignPrimaryTokenPrivilege): None....................................................179

•4.2.34 Take ownership of files or other objects (SeTakeOwnershipPrivilege): Administrators............................... 180

•4.4.1.7 %SystemDrive%\ntbootdd.sys - Administrators: Full; System: Full............................................................ 181

•4.4.1.13 %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson - Administrators: Full; System:Full; Creater Owner: Full; Users (This folder, subfolders and files): Traverse Folder/Execute File, List Folder/ReadData, Read Attributes, Read Extended Attributes, Read Permissions; Users (Subfolders and files only): TraverseFolder/Execute Files, Create Files/Write Data, Create Folder/Append Data............................................................182

•4.4.1.16 %SystemDrive%\Temp - Administrators: Full; System: Full; Creater Owner: Full; Users: Traverse Folders/Execute Files, Create Files/Write Data, Create Folders/Append Data.....................................................................183

•4.4.1.18 %SystemDrive%\Program Files\Resource Kit - Administrators: Full; System: Full...................................184

•4.4.1.20 %SystemRoot%\$NtServicePackUninstall$ - Administrators: Full; System: Full...................................... 185

•4.4.1.37 %SystemRoot%\system32\appmgmt - Administrators: Full; System: Full; Users: Read and Execute,List............................................................................................................................................................................. 186

•4.4.1.39 %SystemRoot%\system32\dllcache - Adminstrators: Full; System: Full; Creater Owner: Full..................187

•4.4.1.41 %SystemRoot%\system32\GroupPolicy - Administrators: Full; System: Full; Authenticated Users: Readand Execute, List.......................................................................................................................................................188

•4.4.1.42 %SystemRoot%\system32\ias - Administrators: Full; System: Full; Creater Owner: Full......................... 189

•4.4.1.44 %SystemRoot%\system32\reinstallbackups - Administrators: Full; System: Full; Creater Owner: Full.....190

•4.4.2.6 HKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib - Administrators: Full; System: Full;Creator ... (see CIS Doc).......................................................................................................................................... 191

•4.4.2.7 HKLM\Software\Microsoft\Windows\CurrentVersion\Group Policy - Administrators: Full; System: Full;Authenticated Users: Read....................................................................................................................................... 192

•4.4.2.9 HKLM\Software\Microsoft\Windows\CurrentVersion\Policies - Administrators: Full; System: Full;Authenticated Users: Read....................................................................................................................................... 193

•4.4.2.13 HKLM\System\ControlSet003 - Administrators Full; System: Full; Creator Owner: Full; Users: Read......194

•4.4.2.13 HKLM\System\ControlSet004 - Administrators Full; System: Full; Creator Owner: Full; Users: Read......195

•4.4.2.13 HKLM\System\ControlSet005 - Administrators Full; System: Full; Creator Owner: Full; Users: Read......196

•4.4.2.13 HKLM\System\ControlSet006 - Administrators Full; System: Full; Creator Owner: Full; Users: Read......197

•4.4.2.13 HKLM\System\ControlSet007 - Administrators Full; System: Full; Creator Owner: Full; Users: Read......198

•4.4.2.13 HKLM\System\ControlSet008 - Administrators Full; System: Full; Creator Owner: Full; Users: Read......199

Page 7: Nessus Report - Tenable Network Security

•4.4.2.13 HKLM\System\ControlSet009 - Administrators Full; System: Full; Creator Owner: Full; Users: Read......200

Compliance 'INFO', 'WARNING', 'ERROR'...................................................................... 201

•2.2.4.1.2 Restrict Guest Access to Logs: Enabled................................................................................................. 202

•2.2.4.2.2 Restrict Guest Access to Logs (Security): Enabled.................................................................................203

•2.2.4.3.2 Restrict Guest Access to Logs (System): Enabled..................................................................................204

•3.2.1.14 Disable CTRL+ALT+Delete Requirement for Logon: Disabled.................................................................205

•3.2.2.3 Disable autoplay from any disk type, regardless of application: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun: 255..................................................................................206

•3.2.2.3.1 Disable autoplay for current user: HKCU\Sofware\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun: 255. Cannot determine this value remotely, if using Security Center please check value andrecast result to passed or failed............................................................................................................................... 207

•3.2.2.5 Mask any typed passwords with asterisks: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Network\HideSharePwds: 1......................................................................................................................................208

•3.2.2.6 Disable Dial-in access to the server: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Network\NoDialIn: 1................................................................................................................................................................209

•3.2.2.9 Remove administrative shares on servers: HKLM\System\CurrentControlSet\Services\LanmanServer\Parameters\AutoShareServer: 0.............................................................................................................................. 210

•3.2.2.10 Protect against Computer Browsing Spoofing Attacks: HKLM\System\CurrentControlSet\Services\MrxSmb\Parameters\RefuseReset: 1..................................................................................................................................... 211

•3.2.2.11 Protect against source-routing spoofing: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\DisableIPSourceRouting: 2...................................................................................................................................... 212

•3.2.2.12 Protect the Default Gateway netowrk setting: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\EnableDeadGWDetect: 0......................................................................................................................................... 213

•3.2.2.14 Help protect against packet fragmentation: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\EnablePMTUDiscovery: 0........................................................................................................................................ 214

•3.2.2.15 Manage keep-alive times: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\KeepAliveTime:300000.......................................................................................................................................................................215

•3.2.2.16 Protect Against Malicious Name-Release Attacks: HKLM\System\CurrentControlSet\Services\NetBt\Parameters\NoNameReleaseOnDemand: 1............................................................................................................ 216

•3.2.2.17 Ensure Router Discover is Disabled: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\SynAttackProtect: 0..................................................................................................................................................217

•3.2.2.18 Protect against SYN Flood attacks: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\SynAttackProtect: 2..................................................................................................................................................218

•3.2.2.19 SYN attack protection - Manage TCP Maximum half-open sockets: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\TcpMaxHalfOpen: 100 or 500......................................................................................219

•3.2.2.20 SYN Attack protection - Manage TCP Maximum half-open retired sockets: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\TcpMaxHalfOpenRetired: 80 or 400...............................................220

•4.4.1.15 %SystemDrive%\System Volume Information - Do not allow permissions this folder to be replaced. Cannotdetermine this value remotely, if using Security Center please check value and recast result to passed or failed... 221

•4.4.1.24 %SystemRoot%\Offline Web Pages - Do not allow permissions on this key to be replaced - Do not allowpermissions this folder to be replaced. Cannot determine this value remotely, if using Security Center please checkvalue and recast result to passed or failed.............................................................................................................. 222

•4.4.1.47 %SystemRoot%\Tasks - Do not allow permissions on this key to be replaced. Cannot determine this valueremotely, if using Security Center please check value and recast result to passed or failed................................... 223

•4.4.2.11 HKLM\System\Clone - Allow inheritable permissions to propogate to this object. Cannot determine thisvalue remotely, if using Security Center please check value and recast result to passed or failed..........................224

•4.4.2.16 HKLM\System\CurrentControlSet\Enum - Administrators: Read; System: Full; Authenticated Users: Read(Do not allow permissions on this key to be replaced). Cannot determine this value remotely, if using Security Centerplease check value and recast result to passed or failed........................................................................................ 225

•4.4.2.18 HKLM\System\CurrentControlSet\Services\SNMP\Parameters\PermittedManagers - Administrators Full;System: Full; Creator Owner: Full............................................................................................................................ 226

•4.4.2.19 HKLM\System\CurrentControlSet\Services\SNMP\Parameters\ValidCommunities - Administrators Full;System: Full; Creator Owner: Full............................................................................................................................ 227

Page 8: Nessus Report - Tenable Network Security

•4.4.2.22 HKU\.Default\Software\Microsoft\Protected Storage System Provider - No entries. Cannot determine thisvalue remotely, if using Security Center please check value and recast result to passed or failed..........................228

Page 9: Nessus Report - Tenable Network Security

Compliance 'FAILED'

Page 10: Nessus Report - Tenable Network Security

10

2.1.1 Minimum Password Length: at least 8 charactersInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 21

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[8..4294967295]

Hosts

192.168.1.205 0

Page 11: Nessus Report - Tenable Network Security

11

2.2.1.1 Audit Account Logon Events: Success and FailureInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 21

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"success, failure"

Hosts

192.168.1.205 "no auditing"

Page 12: Nessus Report - Tenable Network Security

12

2.2.1.2 Audit Account Managemement: Success and FailureInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 22

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"success, failure"

Hosts

192.168.1.205 "no auditing"

Page 13: Nessus Report - Tenable Network Security

13

2.2.1.4 Audit Logon Events: Success and FailureInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 22

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"success, failure"

Hosts

192.168.1.205 "no auditing"

Page 14: Nessus Report - Tenable Network Security

14

2.2.1.5 Audit Object Access: Failure (minimum)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 22

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"failure" || "success, failure"

Hosts

192.168.1.205 "no auditing"

Page 15: Nessus Report - Tenable Network Security

15

2.2.1.6 Audit Policy Change: Success and FailureInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 22

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"success, failure"

Hosts

192.168.1.205 "no auditing"

Page 16: Nessus Report - Tenable Network Security

16

2.2.1.7 Audit Privilege Use: Failure (minimum)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 22

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"failure" || "success, failure"

Hosts

192.168.1.205 "no auditing"

Page 17: Nessus Report - Tenable Network Security

17

2.2.1.9 Audit System Events: Success and FailureInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 23

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"success, failure"

Hosts

192.168.1.205 "no auditing"

Page 18: Nessus Report - Tenable Network Security

18

2.2.2.1 Minimum Password Age: 1 dayInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 23

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[1..4294967295]

Hosts

192.168.1.205 0

Page 19: Nessus Report - Tenable Network Security

19

2.2.2.3 Minimum Password Length: 8 charactersInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 23

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[8..4294967295]

Hosts

192.168.1.205 0

Page 20: Nessus Report - Tenable Network Security

20

2.2.2.4 Password Complexity: EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 23

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

1

Hosts

192.168.1.205 0

Page 21: Nessus Report - Tenable Network Security

21

2.2.2.5 Password History: 24 Passwords RememberedInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 24

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[24..4294967295]

Hosts

192.168.1.205 0

Page 22: Nessus Report - Tenable Network Security

22

2.2.3.2 Account Lockout Threshold: 3 Bad Logon AttemptsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 24

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[1..3]

Hosts

192.168.1.205 0

Page 23: Nessus Report - Tenable Network Security

23

2.2.4.1.1 Maximum Event Log Size (Application): 80MbInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 25

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[81920..4294967295]

Hosts

192.168.1.205 512

Page 24: Nessus Report - Tenable Network Security

24

2.2.4.1.3 Log Retention Method (Application): Overwrite Events As NeededInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 25

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

0

Hosts

192.168.1.205 604800

Page 25: Nessus Report - Tenable Network Security

25

2.2.4.2.1 Maximum Event Log Size (Security): 80MbInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 25

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[81920..4294967295]

Hosts

192.168.1.205 512

Page 26: Nessus Report - Tenable Network Security

26

2.2.4.2.3 Log Retention Method (Security): Overwrite Events As NeededInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 25

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

0

Hosts

192.168.1.205 604800

Page 27: Nessus Report - Tenable Network Security

27

2.2.4.3.1 Maximum Event Log Size (System): 80MbInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 25

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[81920..4294967295]

Hosts

192.168.1.205 512

Page 28: Nessus Report - Tenable Network Security

28

2.2.4.3.3 Log Retention Method (System): Overwrite Events As NeededInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 25

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

0

Hosts

192.168.1.205 604800

Page 29: Nessus Report - Tenable Network Security

29

3.1.1 Additional Restrictions for Anonymous Connections: No Access Without Explicit AnonymousPermissionsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 25

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

2

Hosts

192.168.1.205 0

Page 30: Nessus Report - Tenable Network Security

30

3.2.1.2 Allow System to be Shut Down Without Having to Log On: DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 26

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "enabled"

Page 31: Nessus Report - Tenable Network Security

31

3.2.1.9 Clear Virtual Memory Pagefile When System Shuts Down: EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 27

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"enabled"

Hosts

192.168.1.205 "disabled"

Page 32: Nessus Report - Tenable Network Security

32

3.2.1.13 Digitally Sign Server Communication (When Possible): EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 27

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"enabled"

Hosts

192.168.1.205 "disabled"

Page 33: Nessus Report - Tenable Network Security

33

3.2.1.15 Do Not Display Last User Name in Logon Screen: EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 28

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"enabled"

Hosts

192.168.1.205 "disabled"

Page 34: Nessus Report - Tenable Network Security

34

3.2.1.16 LAN Manager Authentication Level: 'Send NTLMv2 response only'Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 28

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[3..5]

Hosts

192.168.1.205 0

Page 35: Nessus Report - Tenable Network Security

35

3.2.1.17 Message Text for Users Attempting to Log On: Custom Message or ...Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 29

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

""

Hosts

192.168.1.205 ""

Page 36: Nessus Report - Tenable Network Security

36

3.2.1.18 Message Title for Users Attempting to Log On: Warning: or custom titleInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 29

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

""

Hosts

192.168.1.205 ""

Page 37: Nessus Report - Tenable Network Security

37

3.2.1.19 Number of Previous Logons to Cache: 0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 29

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

0

Hosts

192.168.1.205 10

Page 38: Nessus Report - Tenable Network Security

38

3.2.1.21 Prevent Users from Installing Printer Drivers: EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 30

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"enabled"

Hosts

192.168.1.205 "disabled"

Page 39: Nessus Report - Tenable Network Security

39

3.2.1.25 Rename Administrator Account: Anything but AdministratorInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 31

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"administrator"

Hosts

192.168.1.205 "Administrator"

Page 40: Nessus Report - Tenable Network Security

40

3.2.1.26 Rename Guest Account: Any value other than GuestInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 31

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"guest"

Hosts

192.168.1.205 "Guest"

Page 41: Nessus Report - Tenable Network Security

41

3.2.1.28 Restrict Floppy Access to Locally Logged-On User Only: EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 31

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"enabled"

Hosts

192.168.1.205 "disabled"

Page 42: Nessus Report - Tenable Network Security

42

3.2.1.35 Smart Card Removal Behavior: Lock Workstation (minimum)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 33

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[1..2]

Hosts

192.168.1.205 0

Page 43: Nessus Report - Tenable Network Security

43

3.2.1.38 Unsigned Non-Driver Installation Behavior: Warn, but allow installation (minimum) or Do NotAllow InstallationInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 33

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

[1..2]

Hosts

192.168.1.205 0

Page 44: Nessus Report - Tenable Network Security

44

3.2.2.1 Suppress Dr. Watson Crash Dumps: HKLM\Software\Microsoft\DrWatson\CreateCrashDump:0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 34

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

0

Hosts

192.168.1.205 1

Page 45: Nessus Report - Tenable Network Security

45

3.2.2.2 Disable Automatic Execution of the System Debugger: HKLM\Software\Microsoft\Windows NT\CurrentVersion\AEDebug\Auto: 0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 34

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

0

Hosts

192.168.1.205 1

Page 46: Nessus Report - Tenable Network Security

46

3.2.2.7 Disable automatic reboots after a Blue Screen of Death: HKLM\System\CurrentControlSet\Control\CrashControl: 0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 35

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

0

Hosts

192.168.1.205 1

Page 47: Nessus Report - Tenable Network Security

47

3.2.2.8 Disabled CD Autorun: HKLM\System\CurrentControlSet\Services\CDrom\Autorun: 0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 35

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

0

Hosts

192.168.1.205 1

Page 48: Nessus Report - Tenable Network Security

48

3.2.2.13 Ensure ICMP Routing via shortest path first: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\EnableICMPRedirect: 0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 36

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

0

Hosts

192.168.1.205 1

Page 49: Nessus Report - Tenable Network Security

49

4.1 Available Servcies (MSFtpsvc): Permissions on FTP Publishing Service: Administrators: FullControl; System: Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read [...]

Page 50: Nessus Report - Tenable Network Security

50

4.1 Available Services (Alerter): Permissions on Alerter: Administrators: Full Control; System: Read,Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 38

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 1-5-11: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" 1-5-18: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "user-defined control" 1-5-32-544: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" 1-5-32-547: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "s [...]

Page 51: Nessus Report - Tenable Network Security

51

4.1 Available Services (Browser): Permissions on Computer Browser: Administrators: Full Control;System: Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "start" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" [...]

Page 52: Nessus Report - Tenable Network Security

52

4.1 Available Services (ClipSrv): Permissions on Clipbook: Administrators: Full Control; System:Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 38

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object and child objects" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" everyone: + Apply To: "this object and child objects" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" interactive: + Apply To: "this object and child objects" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "start" power users: + Apply To: "this object and child objects" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions"

Page 53: Nessus Report - Tenable Network Security

53

4.1 Available Services (FAX): Permissions on Fax Service: Administrators: Full Control: System;Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" everyone: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "query status" | "start" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" [...]

Page 54: Nessus Report - Tenable Network Security

54

4.1 Available Services (IISADMIN): Permissions on IIS Admin Services: Administrators: Full Control;System: Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read [...]

Page 55: Nessus Report - Tenable Network Security

55

4.1 Available Services (Messenger): Permissions on Messenger: Administrators: Full Control;System: Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "start" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" [...]

Page 56: Nessus Report - Tenable Network Security

56

4.1 Available Services (RemoteAccess): Permissions on Routing and Remote Access:Administrators: Full Control; System: Read, Start, Stop, PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 40

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read [...]

Page 57: Nessus Report - Tenable Network Security

57

4.1 Available Services (RemoteRegistry): Permissions on Remote Registry Service: Administrators:Full Control; System: Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 40

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "start" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" [...]

Page 58: Nessus Report - Tenable Network Security

58

4.1 Available Services (SMTPSVC): Permissions on SMTP: Administrators: Full Control; System:Read, Start, Stop, PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 40

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read [...]

Page 59: Nessus Report - Tenable Network Security

59

4.1 Available Services (SharedAccess): Permissions on Internet Connection Sharing: Administrators:Full Control; System: Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read [...]

Page 60: Nessus Report - Tenable Network Security

60

4.1 Available Services (TlntSvr): Permissions on Telnet: Administrators: Full Control; System: Read,Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 41

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read [...]

Page 61: Nessus Report - Tenable Network Security

61

4.1 Available Services (W3SVC): Permissions on World Wide Web Publishing Service:Administrators: Full Control; System: Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 41

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read [...]

Page 62: Nessus Report - Tenable Network Security

62

4.1 Available Services (mnmsrvc): Permissions on NetMeeting Remote Desktop Sharing:Administrators: Full Control; System: Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this object only"|- Inheritance: "not used"|- Allow: "read" | "start, stop and pause"

Hosts

192.168.1.205 administrators: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "change template" | "delete" | "enumerate dependents" | "full control" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "take ownership" | "user-defined control" authenticated users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "query status" | "query template" | "read permissions" | "user-defined control" power users: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read permissions" | "start" | "stop" | "user-defined control" system: + Apply To: "this object only" |- Inheritance: "not inherited" |- Allow: "enumerate dependents" | "interrogate" | "pause and continue" | "query status" | "query template" | "read [...]

Page 63: Nessus Report - Tenable Network Security

63

4.1.1 Alerter (Alerter): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 38

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "manual"

Page 64: Nessus Report - Tenable Network Security

64

4.1.2 Clipbook (ClipSrv): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 38

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "manual"

Page 65: Nessus Report - Tenable Network Security

65

4.1.3 Computer Browser (Browser): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "automatic"

Page 66: Nessus Report - Tenable Network Security

66

4.1.4 Fax Service (FAX): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "manual"

Page 67: Nessus Report - Tenable Network Security

67

4.1.5 FTP Publishing Service (MSFtpsvc): Disabled (Warning: This will disable FTP Servers)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "automatic"

Page 68: Nessus Report - Tenable Network Security

68

4.1.6 IIS Admin Service (IISADMIN): Disabled (Warning: This will disable Internet InformationServices)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "automatic"

Page 69: Nessus Report - Tenable Network Security

69

4.1.7 Internet Connection Sharing (SharedAccess): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "manual"

Page 70: Nessus Report - Tenable Network Security

70

4.1.8 Messenger (Messenger): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "automatic"

Page 71: Nessus Report - Tenable Network Security

71

4.1.9 NetMeeting Remote Desktop Sharing (mnmsrvc): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 39

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "manual"

Page 72: Nessus Report - Tenable Network Security

72

4.1.10 Remote Registry Service (RemoteRegistry): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 40

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "automatic"

Page 73: Nessus Report - Tenable Network Security

73

4.1.12 Simple Mail Transfer Protocol (SMTP) (SMTPSVC): Disabled (Warning: This will disable certainfunctions on SMTP/IIS Servers!)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 40

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "automatic"

Page 74: Nessus Report - Tenable Network Security

74

4.1.15 Telnet (TlntSvr): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 41

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "manual"

Page 75: Nessus Report - Tenable Network Security

75

4.1.16 World Wide Web Publishing Services (W3SVC): Disabled (Warning: This will disable InternetInformation Services!)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 41

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"disabled"

Hosts

192.168.1.205 "automatic"

Page 76: Nessus Report - Tenable Network Security

76

4.2.1 Access this computer from the network (SeNetworkLogonRight): Users, Administrators (ornone)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 41

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"users" && "administrators"

Hosts

192.168.1.205 "backup operators" && "power users" && "users" && "administrators" && "iwam_windows2000" && "iusr_windows2000" && "everyone"

Page 77: Nessus Report - Tenable Network Security

77

4.2.4 Back up files and directories (SeBackupPrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 42

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"administrators"

Hosts

192.168.1.205 "backup operators" && "administrators"

Page 78: Nessus Report - Tenable Network Security

78

4.2.5 Bypass travrse checking (SeChangeNotifyPrivilege): UsersInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 42

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"users"

Hosts

192.168.1.205 "backup operators" && "power users" && "users" && "administrators" && "everyone"

Page 79: Nessus Report - Tenable Network Security

79

4.2.6 Change the system time (SeSystemTimePrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 42

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"administrators"

Hosts

192.168.1.205 "power users" && "administrators"

Page 80: Nessus Report - Tenable Network Security

80

4.2.10 Debug programs (SeDebugPrivilege): NoneInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 42

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

""

Hosts

192.168.1.205 "administrators"

Page 81: Nessus Report - Tenable Network Security

81

4.2.11 Deny access to this computer from the network (SeDenyNetworkLogonRight): GuestsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 43

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"guests"

Hosts

192.168.1.205 NULL

Page 82: Nessus Report - Tenable Network Security

82

4.2.24 Log on locally (SeInteractiveLogonRight): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 44

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"administrators"

Hosts

192.168.1.205 "backup operators" && "power users" && "users" && "administrators" && "guest" && "iusr_windows2000"

Page 83: Nessus Report - Tenable Network Security

83

4.2.27 Profile single process (SeProfileSingleProcessPrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 44

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"administrators"

Hosts

192.168.1.205 "power users" && "administrators"

Page 84: Nessus Report - Tenable Network Security

84

4.2.29 Remove computer from docking station (SeUndockPrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 44

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"administrators"

Hosts

192.168.1.205 "power users" && "users" && "administrators"

Page 85: Nessus Report - Tenable Network Security

85

4.2.31 Restore files and directories (SeRestorePrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 45

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"administrators"

Hosts

192.168.1.205 "backup operators" && "administrators"

Page 86: Nessus Report - Tenable Network Security

86

4.2.32 Shut down the system (SeShutdownPrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 45

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

"administrators"

Hosts

192.168.1.205 "backup operators" && "power users" && "users" && "administrators"

Page 87: Nessus Report - Tenable Network Security

87

4.4.1.1 %SystemDrive%\ - Administrators: Full; System: Full; Creator Owner: Full; Users: Read andExecute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 46

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subfolders and files only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "list folder contents" | "list folder contents"

Hosts

192.168.1.205 everyone: + Apply To: "this folder, subfolders and files" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes"

Page 88: Nessus Report - Tenable Network Security

88

4.4.1.2 %SystemDrive%\autoexec.bat: Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 46

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes"

Page 89: Nessus Report - Tenable Network Security

89

4.4.1.3 %SystemDrive%\boot.ini - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "trav [...]

Page 90: Nessus Report - Tenable Network Security

90

4.4.1.4 %SystemDrive%\config.sys - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes"

Page 91: Nessus Report - Tenable Network Security

91

4.4.1.5 %SystemDrive%\io.sys - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes"

Page 92: Nessus Report - Tenable Network Security

92

4.4.1.6 %SystemDrive%\msdos.sys - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes"

Page 93: Nessus Report - Tenable Network Security

93

4.4.1.8 %SystemDrive%\ntdetect.com - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "trav [...]

Page 94: Nessus Report - Tenable Network Security

94

4.4.1.9 %SystemDrive%\ntldr - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "trav [...]

Page 95: Nessus Report - Tenable Network Security

95

4.4.1.10 %SystemDrive%\Documents and Settings - Administrators: Full; System: Full; CreaterOwner: Full; Users: Read and Execute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "list folder contents" | "list folder contents"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read exten [...]

Page 96: Nessus Report - Tenable Network Security

96

4.4.1.11 %SystemDrive%\Documents and Settings\Administrator - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrator: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | " [...]

Page 97: Nessus Report - Tenable Network Security

97

4.4.1.12 %SystemDrive%\Documents and Settings\All Users - Administrators: Full; System: Full;Creater Owner: Full; Users: Read and Execute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "list folder contents" | "list folder contents"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read exten [...]

Page 98: Nessus Report - Tenable Network Security

98

4.4.1.14 %SystemDrive%\Documents and Settings\Default User - Administrators: Full; System: Full;Users: Read & Execute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "list folder contents" | "list folder contents"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read exten [...]

Page 99: Nessus Report - Tenable Network Security

99

4.4.1.17 %ProgramFiles% - Administrators: Full; System: Full; Creater Owner: Full; Users: Read andExecute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subfolders and files only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "list folder contents" | "list folder contents"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" creator owner: + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data [...]

Page 100: Nessus Report - Tenable Network Security

100

4.4.1.19 %SystemRoot% - Administrators: Full; System: Full; Creater Owner: Full; Users: Read andExecute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subfolders and files only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "list folder contents" | "list folder contents"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" creator owner: + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data [...]

Page 101: Nessus Report - Tenable Network Security

101

4.4.1.21 %SystemRoote%\CSC - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes"

Page 102: Nessus Report - Tenable Network Security

102

4.4.1.22 %SystemRoot%\Debug - Administrators: Full; System: Full; Creater Owner: Full; Users: Readand Execute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subfolders and files only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "list folder contents" | "list folder contents"

Hosts

192.168.1.205 administrators: + Apply To: "this folder, subfolders and files" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" creator owner: + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" power users: + Apply To: "this folder, subfolders and files" |- Inheritance: "inherited" |- Allow: "create files [...]

Page 103: Nessus Report - Tenable Network Security

103

4.4.1.23 %SystemRoot%\Debug\UserMode - Administrators: Full; System: Full; Users (This folder,only): Traverse Folders/Execute Files, List folder/Read data, Create files/Write data; Users (Filesonly): Create Files/Write Data; Create folders/Append dataInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder only"|- Inheritance: "not used"|- Allow: "traverse folder / execute file" | "list folder / read data" | "create files / write data"+ Apply To: "files only"|- Inheritance: "not used"|- Allow: "create files / write data" | "create folders / append data"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "create files / write data" | "create folders / append d [...]

Page 104: Nessus Report - Tenable Network Security

104

4.4.1.25 %SystemRoot%\Registration - Administrators: Full; System: Full; Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "read"

Hosts

192.168.1.205 administrators: + Apply To: "this folder and files" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder and files" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" system: + Apply To: "this folder and files" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute f [...]

Page 105: Nessus Report - Tenable Network Security

105

4.4.1.26 %SystemRoot%\repair - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" creator owner: + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data [...]

Page 106: Nessus Report - Tenable Network Security

106

4.4.1.27 %SystemRoot%\security - Administrators: Full; System: Full; Creater Owner: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subfolders and files only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" creator owner: + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data [...]

Page 107: Nessus Report - Tenable Network Security

107

4.4.1.28 %SystemRoot%\system32 - Administrators: Full; System: Full; Creater Owner: Full; Users:Read and Execute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subfolders and files only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "list folder contents" | "list folder contents"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" creator owner: + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data [...]

Page 108: Nessus Report - Tenable Network Security

108

4.4.1.29 %SystemRoot%\system32\at.exe - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write [...]

Page 109: Nessus Report - Tenable Network Security

109

4.4.1.30 %SystemRoot%\system32\Ntbackup.exe - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write [...]

Page 110: Nessus Report - Tenable Network Security

110

4.4.1.31 %SystemRoot%\system32\rcp.exe - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write [...]

Page 111: Nessus Report - Tenable Network Security

111

4.4.1.32 %SystemRoot%\regedit.exe - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "trav [...]

Page 112: Nessus Report - Tenable Network Security

112

4.4.1.33 %SystemRoot%\system32\regedt32.exe - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write [...]

Page 113: Nessus Report - Tenable Network Security

113

4.4.1.34 %SystemRoot%\system32\rexec.exe - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write [...]

Page 114: Nessus Report - Tenable Network Security

114

4.4.1.35 %SystemRoot%\system32\rsh.exe - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write [...]

Page 115: Nessus Report - Tenable Network Security

115

4.4.1.36 %SystemRoot%\system32\secedit.exe - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" everyone: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" power users: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "traverse folder / execute file" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write [...]

Page 116: Nessus Report - Tenable Network Security

116

4.4.1.38 %SystemRoot%\config - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder, subfolders and files" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" creator owner: + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" power users: + Apply To: "this folder, subfolders and files" |- Inheritance: "inherited" |- Allow: "create files [...]

Page 117: Nessus Report - Tenable Network Security

117

4.4.1.40 %SystemRoot%\system32\DTCLog - Administrators: Full; System: Full; Users: Read andExecute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subfolders and files only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "list folder contents" | "list folder contents"

Hosts

192.168.1.205 administrators: + Apply To: "this folder, subfolders and files" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" creator owner: + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" power users: + Apply To: "this folder, subfolders and files" |- Inheritance: "inherited" |- Allow: "create files [...]

Page 118: Nessus Report - Tenable Network Security

118

4.4.1.43 %SystemRoot%\system32\NTMSData - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" system: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes"

Page 119: Nessus Report - Tenable Network Security

119

4.4.1.45 %SystemRoot%\system32\Setup - Admininstrators: Full; System: Full; Users: Read andExecute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "list folder contents" | "list folder contents"

Hosts

192.168.1.205 everyone: + Apply To: "this folder, subfolders and files" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes"

Page 120: Nessus Report - Tenable Network Security

120

4.4.1.46 %SystemRoot%\system32\spool\printers - Administrators: Full; System: Full; Creater Owner:Full; Users: Traverse Folder/Execute file, Read, Read Extended Attributes, Create folders, AppendDataInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subfolders and files only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "traverse folder / execute file" | "read attributes" | "read extended attributes" | "create folders / append data"

Hosts

192.168.1.205 administrators: + Apply To: "this folder, subfolders and files" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" creator owner: + Apply To: "this folder, subfolders and files" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" power users: + Apply To: "this folder and subfolders" |- Inheritance: "not inherited" |- Allow: " [...]

Page 121: Nessus Report - Tenable Network Security

121

4.4.1.48 %SystemRoot%\Temp - Administrators: Full; System: Full; Creater Owner: Full; Users:Traverse Folders/Execute Files, Create Files/Write Data, Create Folders/Append DataInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subfolders and files only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not used"|- Allow: "traverse folder / execute file" | "create files / write data" | "create folders / append data"

Hosts

192.168.1.205 administrators: + Apply To: "this folder only" |- Inheritance: "not inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data" | "create folders / append data" | "delete" | "delete subfolder and files" | "full control" | "list folder / read data" | "read attributes" | "read extended attributes" | "read permissions" | "take ownership" | "traverse folder / execute file" | "write attributes" | "write extended attributes" creator owner: + Apply To: "subfolders and files only" |- Inheritance: "inherited" |- Allow: "change permissions" | "create files / write data [...]

Page 122: Nessus Report - Tenable Network Security

122

4.4.2.1 HKLM\Software\Classes - Administrators: Full; System: Full; Creater Owner: Full; Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "read"

Hosts

192.168.1.205 administrators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" creator owner: + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" everyone: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "enumerate subkeys" | "notify" | "query value" | "read control" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "enumerate subkeys" | "notify" | "qu [...]

Page 123: Nessus Report - Tenable Network Security

123

4.4.2.2 HKLM\Software - Administrators: Full; System: Full; Creater Owner: Full; Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "read"

Hosts

192.168.1.205 administrators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" creator owner: + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" power users: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create subkey" | "delete" | "enumerate subkeys" | "notify" | "query value" | "read control" | "set value" + Apply To: "subkeys only" |- Inheritance: "inherited" [...]

Page 124: Nessus Report - Tenable Network Security

124

4.4.2.3 HKLM\Software\Microsoft\NetDDE - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" creator owner: + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" system: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + [...]

Page 125: Nessus Report - Tenable Network Security

125

4.4.2.4 HKLM\Software\Microsoft\OS/2 Subsystem for NT - Administrators: Full System: FUll; CreaterOwner: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control" | "query value" | "set value" | "create subkey" | "enumerate subkeys" | "notify" | "create link" |"delete" | "write dac" | "write owner" | "read control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this key and subkeys" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" everyone: + Apply To: "this key and subkeys" |- Inheritance: "not inherited" |- Allow: "enumerate subkeys" | "notify" | "query value" | "read control"

Page 126: Nessus Report - Tenable Network Security

126

4.4.2.5 HKLM\Software\Microsoft\Windows NT\CurrentVersion\AsrCommands - Administrators: Full;System: Full; Creater Owner: Full; Users: Read; Backup Operators (this key and subkeys): QueryValue, Set Value, Create Subkey, Enumerate Subkeys, Notify, Delete, ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"backup operators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "query value" | "set value" | "create subkey" | "enumerate subkeys" | "notify" | "delete" | "read"creator owner:+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "read"

Hosts

192.168.1.205 administrators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" backup operators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create subkey" | "delete" | "enumerate subkeys" | "notify" | "query value" | "read control" | "set value" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create subkey" | "delete" | "enumerate subkeys" | "notify" | "query value" | "read control" | "set value" creator owner: + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "en [...]

Page 127: Nessus Report - Tenable Network Security

127

4.4.2.8 HKLM\Software\Microsoft\Windows\CurrentVersion\Installer - Administrators: Full; System:Full; Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "read"

Hosts

192.168.1.205 administrators: + Apply To: "this key and subkeys" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" everyone: + Apply To: "this key and subkeys" |- Inheritance: "not inherited" |- Allow: "enumerate subkeys" | "notify" | "query value" | "read control" system: + Apply To: "this key and subkeys" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner"

Page 128: Nessus Report - Tenable Network Security

128

4.4.2.10 HKLM\System - Administrators: Full; System: Full; Creater Owner: Full; Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "read"

Hosts

192.168.1.205 administrators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" creator owner: + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" power users: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "enumerate subkeys" | "notify" | "query value" | "read control" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "enumerate subkeys" | "notify" | [...]

Page 129: Nessus Report - Tenable Network Security

129

4.4.2.12 HKLM\System\ControlSet001 - Administrators: Full; System: Full; Creater Owner: Full;Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "read"

Hosts

192.168.1.205 administrators: + Apply To: "this key and subkeys" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" creator owner: + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" power users: + Apply To: "this key and subkeys" |- Inheritance: "inherited" |- Allow: "enumerate subkeys" | "notify" | "query value" | "read control" system: + Apply To: "this key and subkeys" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" users: + Apply To: "this key and subkeys" |- Inheritance: "inherited" |- A [...]

Page 130: Nessus Report - Tenable Network Security

130

4.4.2.13 HKLM\System\ControlSet002 - Administrators: Full; System: Full; Creater Owner: Full;Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "read"

Hosts

192.168.1.205 administrators: + Apply To: "this key and subkeys" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" creator owner: + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" power users: + Apply To: "this key and subkeys" |- Inheritance: "inherited" |- Allow: "enumerate subkeys" | "notify" | "query value" | "read control" system: + Apply To: "this key and subkeys" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" users: + Apply To: "this key and subkeys" |- Inheritance: "inherited" |- A [...]

Page 131: Nessus Report - Tenable Network Security

131

4.4.2.14 HKLM\System\CurrentControlSet\Control\SecurePipeServers\WinReg - Administrators: Full;System: Full; Backup Operators: Query Value, Enumerate Subkeys, Notify, Read PermissionsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"backup operators:+ Apply To: "this key only"|- Inheritance: "not used"|- Allow: "read"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" backup operators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "enumerate subkeys" | "notify" | "query value" | "read control"

Page 132: Nessus Report - Tenable Network Security

132

4.4.2.15 HKLM\System\CurrentControlSet\Control\WMI\Security - Administrators: Full; System: Full;Creater Owner (this key and subkeys): FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key only"|- Inheritance: "not used"+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "enumerate subkeys" | "notify" | "query value" | "read control" creator owner: + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" system: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "del [...]

Page 133: Nessus Report - Tenable Network Security

133

4.4.2.17 HKLM\System\CurrentControlSet\Hardware Profiles - Administrators: Full; System: Full;Creater Owner: Full; Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "read"

Hosts

192.168.1.205 administrators: + Apply To: "this key and subkeys" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" creator owner: + Apply To: "this key and subkeys" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" power users: + Apply To: "this key and subkeys" |- Inheritance: "not inherited" |- Allow: "enumerate subkeys" | "notify" | "query value" | "read control" system: + Apply To: "this key and subkeys" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" users: + Apply To: "this key and subkeys" |- Inherit [...]

Page 134: Nessus Report - Tenable Network Security

134

4.4.2.20 HKU\.Default - Administrators: Full; System: Full; Creater Owner: Full; Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"creator owner:+ Apply To: "subkeys only"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"users:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "read"

Hosts

192.168.1.205 administrators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" creator owner: + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" power users: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "enumerate subkeys" | "notify" | "query value" | "read control" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "enumerate subkeys" | "notify" | [...]

Page 135: Nessus Report - Tenable Network Security

135

4.4.2.21 HKU\.Default\Software\Microsoft\NetDDEInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

administrators:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"system:+ Apply To: "this key and subkeys"|- Inheritance: "not used"|- Allow: "full control"

Hosts

192.168.1.205 administrators: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" creator owner: + Apply To: "subkeys only" |- Inheritance: "inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" system: + Apply To: "this key only" |- Inheritance: "not inherited" |- Allow: "create link" | "create subkey" | "delete" | "enumerate subkeys" | "full control" | "notify" | "query value" | "read control" | "set value" | "write dac" | "write owner" + [...]

Page 136: Nessus Report - Tenable Network Security

136

4.4.3.1 %SystemDrive% - Everyone: Failures (this folder, propagate inheritable permissions to allsubfolders)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

everyone:+ Apply To: "this folder, subfolders and files"|- Inheritance: "not inherited"|- Deny: "full control"

Hosts

192.168.1.205

Page 137: Nessus Report - Tenable Network Security

137

4.4.3.2 HKLM\Software - Everyone: Failures (this key, propagate inheritable permissions to allsubfolders)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

everyone:+ Apply To: "this key and subkeys"|- Inheritance: "not inherited"|- Deny: "full control"

Hosts

192.168.1.205

Page 138: Nessus Report - Tenable Network Security

138

4.4.3.3 HKLM\System - Everyone: Failures (this key, propagate inheritable permissions to allsubfolders)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Policy Value

everyone:+ Apply To: "this key and subkeys"|- Inheritance: "not inherited"|- Deny: "full control"

Hosts

192.168.1.205

Page 139: Nessus Report - Tenable Network Security

Compliance 'SKIPPED'

Page 140: Nessus Report - Tenable Network Security

Compliance 'PASSED'

Page 141: Nessus Report - Tenable Network Security

141

2.1.2 Maximum Password Age: no more than 90 days oldInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 21

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 142: Nessus Report - Tenable Network Security

142

2.2.2.2 Maximum Password Age: 90 daysInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 23

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 143: Nessus Report - Tenable Network Security

143

2.2.2.6 Store Passwords using Reversible Encryption: DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 24

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 144: Nessus Report - Tenable Network Security

144

2.2.3.1 Account Lockout Duration: 15 minutesInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 24

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 145: Nessus Report - Tenable Network Security

145

2.2.3.3 Reset Account Lockout After: 15 MinutesInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 24

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 146: Nessus Report - Tenable Network Security

146

3.2.1.3 Allowed to Eject Removable NTFS Media: AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 26

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 147: Nessus Report - Tenable Network Security

147

3.2.1.4 Amount of Idle Time Required Before Disconnecting Session: 30 MinutesInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 26

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 148: Nessus Report - Tenable Network Security

148

3.2.1.7 Automatically Log Off Users When Logon Time Expires: EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 26

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 149: Nessus Report - Tenable Network Security

149

3.2.1.11 Digitally Sign Client Communication (When Possible): EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 27

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 150: Nessus Report - Tenable Network Security

150

3.2.1.20 Prevent System Maintenance of Computer Account Password: DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 29

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 151: Nessus Report - Tenable Network Security

151

3.2.1.22 Prompt User to Change Password Before Expiration: 14 daysInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 30

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 152: Nessus Report - Tenable Network Security

152

3.2.1.23 Recovery Console: Allow Automatic Administrative Logon: DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 30

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 153: Nessus Report - Tenable Network Security

153

3.2.1.24 Recover Console: Allow Floppy Copy and Access to All Drives and All Folders: DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 30

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 154: Nessus Report - Tenable Network Security

154

3.2.1.30 Secure Channel: Digitally Encrypt Secure Channel Data (When Possible): EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 32

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 155: Nessus Report - Tenable Network Security

155

3.2.1.31 Secure Channel: Digitally Sign Secure Channel Data (When Possible): EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 32

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 156: Nessus Report - Tenable Network Security

156

3.2.1.33 Send Unencrypted Password to Connect to Third-Part SMB Servers: DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 32

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 157: Nessus Report - Tenable Network Security

157

3.2.1.36 Strengthen Default Permissions of Global System Objects (i.e. Symbolic Links): EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 33

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 158: Nessus Report - Tenable Network Security

158

3.2.1.37 Unsigned Driver Installation Behavior: Warn, but allow installation (minimum) or Do NotAllow InstallationInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 33

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 159: Nessus Report - Tenable Network Security

159

3.2.2.4 Disable Automatic Logon: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\AutoAdminLogon: 0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 34

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 160: Nessus Report - Tenable Network Security

160

3.2.2.21 Enable IPSec to protect Kerberos RSVP Traffic: HKLM\System\CurrentControlSet\Services\IPSEC\NoDefaultExempt: 1Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 38

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 161: Nessus Report - Tenable Network Security

161

4.1 Available Services (SNMP): Permissions on SNMP: Administrators: Full Control; System: Read,Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 41

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 162: Nessus Report - Tenable Network Security

162

4.1 Available Services (SNMPTRAP): Permissions on SNMP Trap: Administrators: Full Control;Sytem: Read, Start, Stop, and PauseInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 41

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 163: Nessus Report - Tenable Network Security

163

4.1.11 Routing and Remote Access (RemoteAccess): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 40

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 164: Nessus Report - Tenable Network Security

164

4.1.13 Simple Network Management Protocol (SNMP) Service: DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 40

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 165: Nessus Report - Tenable Network Security

165

4.1.14 Simple Network Management Protocol (SNMP) Trap (SNMPTRAP): DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 41

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 166: Nessus Report - Tenable Network Security

166

4.2.2 Act as part of the operating system (SeTcbPrivilege): NoneInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 42

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 167: Nessus Report - Tenable Network Security

167

4.2.7 Create a pagefile (SeCreatePagefilePrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 42

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 168: Nessus Report - Tenable Network Security

168

4.2.8 Create a token object (SeCreateTokenPrivilege): NoneInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 42

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 169: Nessus Report - Tenable Network Security

169

4.2.9 Create permanent shared objects (SeCreatePermanentPrivilege): NoneInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 42

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 170: Nessus Report - Tenable Network Security

170

4.2.16 Force shutdown from a remote system (SeRemoteShutdownPrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 43

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 171: Nessus Report - Tenable Network Security

171

4.2.17 Generate security audits (SeAuditPrivilege): NoneInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 43

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 172: Nessus Report - Tenable Network Security

172

4.2.18 Increase quotas: AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 43

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 173: Nessus Report - Tenable Network Security

173

4.2.19 Increase schedulign priority (SeIncreaseBasePriorityPrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 43

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 174: Nessus Report - Tenable Network Security

174

4.2.20 Load and unload device drivers (SeLoadDriverPrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 43

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 175: Nessus Report - Tenable Network Security

175

4.2.21 Lock pages in memory (SeLockMemoryPrivilege): NoneInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 44

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 176: Nessus Report - Tenable Network Security

176

4.2.25 Manage auditing and security log (SeSecurityPrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 44

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 177: Nessus Report - Tenable Network Security

177

4.2.26 Modify firmware environment values (SeSystemEnvironmentPrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 44

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 178: Nessus Report - Tenable Network Security

178

4.2.28 Profile system performance (SeSystemProfilePrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 44

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 179: Nessus Report - Tenable Network Security

179

4.2.30 Replace a process level token (SeAssignPrimaryTokenPrivilege): NoneInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 44

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 180: Nessus Report - Tenable Network Security

180

4.2.34 Take ownership of files or other objects (SeTakeOwnershipPrivilege): AdministratorsInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 45

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 181: Nessus Report - Tenable Network Security

181

4.4.1.7 %SystemDrive%\ntbootdd.sys - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 182: Nessus Report - Tenable Network Security

182

4.4.1.13 %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson - Administrators:Full; System: Full; Creater Owner: Full; Users (This folder, subfolders and files): Traverse Folder/Execute File, List Folder/Read Data, Read Attributes, Read Extended Attributes, Read Permissions;Users (Subfolders and files only): Traverse Folder/Execute Files, Create Files/Write Data, CreateFolder/Append DataInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 183: Nessus Report - Tenable Network Security

183

4.4.1.16 %SystemDrive%\Temp - Administrators: Full; System: Full; Creater Owner: Full; Users:Traverse Folders/Execute Files, Create Files/Write Data, Create Folders/Append DataInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 184: Nessus Report - Tenable Network Security

184

4.4.1.18 %SystemDrive%\Program Files\Resource Kit - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 185: Nessus Report - Tenable Network Security

185

4.4.1.20 %SystemRoot%\$NtServicePackUninstall$ - Administrators: Full; System: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 186: Nessus Report - Tenable Network Security

186

4.4.1.37 %SystemRoot%\system32\appmgmt - Administrators: Full; System: Full; Users: Read andExecute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 187: Nessus Report - Tenable Network Security

187

4.4.1.39 %SystemRoot%\system32\dllcache - Adminstrators: Full; System: Full; Creater Owner: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 188: Nessus Report - Tenable Network Security

188

4.4.1.41 %SystemRoot%\system32\GroupPolicy - Administrators: Full; System: Full; AuthenticatedUsers: Read and Execute, ListInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 189: Nessus Report - Tenable Network Security

189

4.4.1.42 %SystemRoot%\system32\ias - Administrators: Full; System: Full; Creater Owner: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 190: Nessus Report - Tenable Network Security

190

4.4.1.44 %SystemRoot%\system32\reinstallbackups - Administrators: Full; System: Full; CreaterOwner: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 191: Nessus Report - Tenable Network Security

191

4.4.2.6 HKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib - Administrators: Full; System:Full; Creator ... (see CIS Doc)Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 192: Nessus Report - Tenable Network Security

192

4.4.2.7 HKLM\Software\Microsoft\Windows\CurrentVersion\Group Policy - Administrators: Full;System: Full; Authenticated Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 193: Nessus Report - Tenable Network Security

193

4.4.2.9 HKLM\Software\Microsoft\Windows\CurrentVersion\Policies - Administrators: Full; System:Full; Authenticated Users: ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 194: Nessus Report - Tenable Network Security

194

4.4.2.13 HKLM\System\ControlSet003 - Administrators Full; System: Full; Creator Owner: Full; Users:ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 195: Nessus Report - Tenable Network Security

195

4.4.2.13 HKLM\System\ControlSet004 - Administrators Full; System: Full; Creator Owner: Full; Users:ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 196: Nessus Report - Tenable Network Security

196

4.4.2.13 HKLM\System\ControlSet005 - Administrators Full; System: Full; Creator Owner: Full; Users:ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 197: Nessus Report - Tenable Network Security

197

4.4.2.13 HKLM\System\ControlSet006 - Administrators Full; System: Full; Creator Owner: Full; Users:ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 198: Nessus Report - Tenable Network Security

198

4.4.2.13 HKLM\System\ControlSet007 - Administrators Full; System: Full; Creator Owner: Full; Users:ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 199: Nessus Report - Tenable Network Security

199

4.4.2.13 HKLM\System\ControlSet008 - Administrators Full; System: Full; Creator Owner: Full; Users:ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 200: Nessus Report - Tenable Network Security

200

4.4.2.13 HKLM\System\ControlSet009 - Administrators Full; System: Full; Creator Owner: Full; Users:ReadInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 201: Nessus Report - Tenable Network Security

Compliance 'INFO', 'WARNING', 'ERROR'

Page 202: Nessus Report - Tenable Network Security

202

2.2.4.1.2 Restrict Guest Access to Logs: EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 25

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 203: Nessus Report - Tenable Network Security

203

2.2.4.2.2 Restrict Guest Access to Logs (Security): EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 25

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 204: Nessus Report - Tenable Network Security

204

2.2.4.3.2 Restrict Guest Access to Logs (System): EnabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 25

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 205: Nessus Report - Tenable Network Security

205

3.2.1.14 Disable CTRL+ALT+Delete Requirement for Logon: DisabledInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 28

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 206: Nessus Report - Tenable Network Security

206

3.2.2.3 Disable autoplay from any disk type, regardless of application: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun: 255Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 34

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_OPEN_KEY: an error happened while opening the key Windows error code: ERROR_FILE_NOT_FOUND

Page 207: Nessus Report - Tenable Network Security

207

3.2.2.3.1 Disable autoplay for current user: HKCU\Sofware\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun: 255. Cannot determine this value remotely, if using SecurityCenter please check value and recast result to passed or failedAudit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 208: Nessus Report - Tenable Network Security

208

3.2.2.5 Mask any typed passwords with asterisks: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Network\HideSharePwds: 1Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 35

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_OPEN_KEY: an error happened while opening the key Windows error code: ERROR_FILE_NOT_FOUND

Page 209: Nessus Report - Tenable Network Security

209

3.2.2.6 Disable Dial-in access to the server: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Network\NoDialIn: 1Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 35

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_OPEN_KEY: an error happened while opening the key Windows error code: ERROR_FILE_NOT_FOUND

Page 210: Nessus Report - Tenable Network Security

210

3.2.2.9 Remove administrative shares on servers: HKLM\System\CurrentControlSet\Services\LanmanServer\Parameters\AutoShareServer: 0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 35

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 211: Nessus Report - Tenable Network Security

211

3.2.2.10 Protect against Computer Browsing Spoofing Attacks: HKLM\System\CurrentControlSet\Services\MrxSmb\Parameters\RefuseReset: 1Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 35

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 212: Nessus Report - Tenable Network Security

212

3.2.2.11 Protect against source-routing spoofing: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\DisableIPSourceRouting: 2Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 36

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 213: Nessus Report - Tenable Network Security

213

3.2.2.12 Protect the Default Gateway netowrk setting: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\EnableDeadGWDetect: 0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 36

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 214: Nessus Report - Tenable Network Security

214

3.2.2.14 Help protect against packet fragmentation: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\EnablePMTUDiscovery: 0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 36

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 215: Nessus Report - Tenable Network Security

215

3.2.2.15 Manage keep-alive times: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\KeepAliveTime: 300000Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 36

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 216: Nessus Report - Tenable Network Security

216

3.2.2.16 Protect Against Malicious Name-Release Attacks: HKLM\System\CurrentControlSet\Services\NetBt\Parameters\NoNameReleaseOnDemand: 1Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 37

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 217: Nessus Report - Tenable Network Security

217

3.2.2.17 Ensure Router Discover is Disabled: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\SynAttackProtect: 0Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 37

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 218: Nessus Report - Tenable Network Security

218

3.2.2.18 Protect against SYN Flood attacks: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\SynAttackProtect: 2Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 37

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 219: Nessus Report - Tenable Network Security

219

3.2.2.19 SYN attack protection - Manage TCP Maximum half-open sockets: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\TcpMaxHalfOpen: 100 or 500Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 37

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 220: Nessus Report - Tenable Network Security

220

3.2.2.20 SYN Attack protection - Manage TCP Maximum half-open retired sockets: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\TcpMaxHalfOpenRetired: 80 or 400Info

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 37

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_QUERY_VALUE: an error happened while querying the value Windows error code: ERROR_FILE_NOT_FOUND

Page 221: Nessus Report - Tenable Network Security

221

4.4.1.15 %SystemDrive%\System Volume Information - Do not allow permissions this folder to bereplaced. Cannot determine this value remotely, if using Security Center please check value andrecast result to passed or failedInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 47

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 222: Nessus Report - Tenable Network Security

222

4.4.1.24 %SystemRoot%\Offline Web Pages - Do not allow permissions on this key to be replaced -Do not allow permissions this folder to be replaced. Cannot determine this value remotely, if usingSecurity Center please check value and recast result to passed or failedInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 48

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 223: Nessus Report - Tenable Network Security

223

4.4.1.47 %SystemRoot%\Tasks - Do not allow permissions on this key to be replaced. Cannotdetermine this value remotely, if using Security Center please check value and recast result topassed or failedAudit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 224: Nessus Report - Tenable Network Security

224

4.4.2.11 HKLM\System\Clone - Allow inheritable permissions to propogate to this object. Cannotdetermine this value remotely, if using Security Center please check value and recast result topassed or failedInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 49

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 225: Nessus Report - Tenable Network Security

225

4.4.2.16 HKLM\System\CurrentControlSet\Enum - Administrators: Read; System: Full; AuthenticatedUsers: Read (Do not allow permissions on this key to be replaced). Cannot determine this valueremotely, if using Security Center please check value and recast result to passed or failedInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205

Page 226: Nessus Report - Tenable Network Security

226

4.4.2.18 HKLM\System\CurrentControlSet\Services\SNMP\Parameters\PermittedManagers -Administrators Full; System: Full; Creator Owner: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_OPEN_KEY: an error happened while opening the key

Page 227: Nessus Report - Tenable Network Security

227

4.4.2.19 HKLM\System\CurrentControlSet\Services\SNMP\Parameters\ValidCommunities -Administrators Full; System: Full; Creator Owner: FullInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205 REG_ERROR_OPEN_KEY: an error happened while opening the key

Page 228: Nessus Report - Tenable Network Security

228

4.4.2.22 HKU\.Default\Software\Microsoft\Protected Storage System Provider - No entries. Cannotdetermine this value remotely, if using Security Center please check value and recast result topassed or failedInfo

ref: https://benchmarks.cisecurity.org/tools2/windows/CIS_Win2k_Srv_Benchmark_v2.2.1.pdf pg. 50

Audit File

CIS_W2KSrvr_L2_v2.audit

Hosts

192.168.1.205