-
Notifications
You must be signed in to change notification settings - Fork 4
Expand file tree
/
Copy pathscid-database.json
More file actions
1744 lines (1744 loc) · 72.9 KB
/
scid-database.json
File metadata and controls
1744 lines (1744 loc) · 72.9 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
{
"scid-15": {
"platform": "Windows",
"name": "Enable Automatic Updates",
"function": "Microsoft Office",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Controls whether the Office automatic updates are enabled or disabled for all Office products installed by using Click-to-Run. This policy has no effect on Office products installed via Windows Installer.",
"impact": 5
},
"scid-16": {
"platform": "Windows",
"name": "Enable 'Hide Option to Enable or Disable Updates'",
"function": "Microsoft Office",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Controls whether to hide the user interface (UI) options to enable or disable Office automatic updates from users.",
"impact": 5
},
"scid-19": {
"platform": "Windows",
"name": "Disable 'Continue running background apps when Google Chrome is closed'",
"function": "Google Chrome",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Chrome allows for processes started while the browser is open to remain running once the browser has been closed. It also allows for background apps and the current browsing session to remain active after the browser has been closed. Disabling this feature will stop all processes and background applications when the browser window is closed.",
"impact": 5
},
"scid-22": {
"platform": "Windows",
"name": "Disable 'Password Manager'",
"function": "Google Chrome",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "If this setting is enabled, Chrome will memorize passwords and automatically provide them when a user logs into a site. By disabling this feature the user will be prompted to enter their password each time they visit a website.",
"impact": 5
},
"scid-23": {
"platform": "Windows",
"name": "Enable 'Block third party cookies'",
"function": "Google Chrome",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Chrome allows cookies to be set by web page elements that are not from the domain in the user's address bar. Enabling this feature prevents third party cookies from being set.",
"impact": 2
},
"scid-24": {
"platform": "Windows",
"name": "Set 'Remote Desktop security level' to 'TLS'",
"function": "Network",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the method used by the server and client for authentication prior to a remote desktop connection being established.",
"impact": 8
},
"scid-25": {
"platform": "Windows",
"name": "Enable 'Local Security Authority (LSA) protection'",
"function": "OS",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Forces LSA to run as Protected Process Light (PPL).",
"impact": 8
},
"scid-26": {
"platform": "Windows",
"name": "Enable 'Safe DLL Search Mode'",
"function": "OS",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether an application searches for DLLs in the system path before searching the current working directory .",
"impact": 8
},
"scid-27": {
"platform": "Windows",
"name": "Set User Account Control (UAC) to automatically deny elevation requests",
"function": "OS",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the behavior of the elevation prompt for standard users.",
"impact": 8
},
"scid-28": {
"platform": "Windows",
"name": "Set 'Interactive logon: Machine inactivity limit' to '1-900 seconds'",
"function": "OS",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the amount of inactivity time (in seconds) of a logon session, beyond which the screen saver will run, locking the session. This security control is only applicable for machines with Windows 10, version 1709 or later.",
"impact": 5
},
"scid-29": {
"platform": "Windows",
"name": "Disable 'Enumerate administrator accounts on elevation'",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether the user needs to provide both the administrator username and password to elevate a running application, or if the system displays a list of administrator accounts to choose from.",
"impact": 8
},
"scid-30": {
"platform": "Windows",
"name": "Disable 'Insecure guest logons' in SMB",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether insecure guest logons are used by file servers to allow unauthenticated access to shared folders.",
"impact": 8
},
"scid-32": {
"platform": "Windows",
"name": "Set 'Minimum password length' to '14 or more characters'",
"function": "Accounts",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the minimum password length. This security control is only assessed for machines with Windows 10, version 1709 or later.",
"impact": 5
},
"scid-33": {
"platform": "Windows",
"name": "Set 'Enforce password history' to '24 or more password(s)'",
"function": "Accounts",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the number of unique new passwords that are required before an old password can be reused in association with a user account. This security control is only assessed for machines with Windows 10, version 1709 or later.",
"impact": 5
},
"scid-34": {
"platform": "Windows",
"name": "Set 'Maximum password age' to '60 or fewer days, but not 0'",
"function": "Accounts",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the period of time (in days) that a password can be used before the system requires the user to change it. This security control is only assessed for machines with Windows 10, version 1709 or later.",
"impact": 5
},
"scid-35": {
"platform": "Windows",
"name": "Set 'Minimum password age' to '1 or more day(s)'",
"function": "Accounts",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the number of days that you must use a password before you can change it. This security control is only assessed for machines with Windows 10, version 1709 or later.",
"impact": 5
},
"scid-36": {
"platform": "Windows",
"name": "Enable 'Domain member: Require strong (Windows 2000 or later) session key'",
"function": "OS",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "When this policy setting is enabled, a secure channel can only be established with Domain controllers that are capable of encrypting secure channel data with a strong (128-bit) session key.",
"impact": 5
},
"scid-37": {
"platform": "Windows",
"name": "Enable 'Domain member: Digitally encrypt or sign secure channel data (always)'",
"function": "OS",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether all secure channel traffic that is initiated by the domain member must be signed or encrypted.",
"impact": 5
},
"scid-38": {
"platform": "Windows",
"name": "Enable Set 'Domain member: Digitally encrypt secure channel data (when possible)'",
"function": "OS",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether a domain member should attempt to negotiate encryption for all secure channel traffic that it initiates.",
"impact": 5
},
"scid-39": {
"platform": "Windows",
"name": "Enable 'Domain member: Digitally sign secure channel data (when possible)'",
"function": "OS",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether a domain member should attempt to negotiate whether all secure channel traffic that it initiates must be digitally signed. Digital signatures protect the traffic from being modified by anyone who captures the data as it traverses the network.",
"impact": 5
},
"scid-40": {
"platform": "Windows",
"name": "Disable 'Domain member: Disable machine account password changes'",
"function": "Accounts",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether automatic password changes are enforced on computer accounts.",
"impact": 2
},
"scid-41": {
"platform": "Windows",
"name": "Set 'Account lockout duration' to 15 minutes or more",
"function": "Accounts",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the length of time that must pass before a locked account is unlocked and a user can try to log on again. If configured to 0, accounts will remain locked out until an administrator manually unlocks them. This security control is only assessed for machines with Windows 10, version 1709 or later.",
"impact": 6
},
"scid-42": {
"platform": "Windows",
"name": "Set 'Reset account lockout counter after' to 15 minutes or more",
"function": "Accounts",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the length of time before the 'Account lockout threshold' counter resets to zero after a failed logon attempt. This reset time must be less than or equal to the value of the 'Account lockout duration' setting. This security control is only assessed for machines with Windows 10, version 1709 or later.",
"impact": 6
},
"scid-43": {
"platform": "Windows",
"name": "Disable Microsoft Defender Firewall notifications when programs are blocked for Domain profile",
"function": "Firewall",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether Microsoft Defender Firewall with Advanced Security display notifications to the user when a program is blocked from receiving inbound connections.",
"impact": 2
},
"scid-44": {
"platform": "Windows",
"name": "Set 'Account lockout threshold' to 1-10 invalid login attempts",
"function": "Accounts",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the number of failed logon attempts before the account is locked. The number of failed logon attempts should be reasonably small to minimize the possibility of a successful password attack, while still allowing for honest errors made during a legitimate user logon. This security control is only assessed for machines with Windows 10, version 1709 or later.",
"impact": 6
},
"scid-45": {
"platform": "Windows",
"name": "Set user authentication for remote connections by using Network Level Authentication to 'Enabled'",
"function": "Network",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines whether to require user authentication for remote connections to the RD Session Host server by using Network Level Authentication.",
"impact": 5
},
"scid-46": {
"platform": "Windows",
"name": "Disable Microsoft Defender Firewall notifications when programs are blocked for Private profile",
"function": "Firewall",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether Microsoft Defender Firewall with Advanced Security display notifications to the user when a program is blocked from receiving inbound connections.",
"impact": 2
},
"scid-49": {
"platform": "Windows",
"name": "Disable Microsoft Defender Firewall notifications when programs are blocked for Public profile",
"function": "Firewall",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether Microsoft Defender Firewall with Advanced Security display notifications to the user when a program is blocked from receiving inbound connections.",
"impact": 2
},
"scid-50": {
"platform": "Windows",
"name": "Disable merging of local Microsoft Defender Firewall rules with group policy firewall rules for the Public profile",
"function": "Firewall",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Controls whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy. This recommendation is not applicable to Azure virtual machines.",
"impact": 5
},
"scid-51": {
"platform": "Windows",
"name": "Disable merging of local Microsoft Defender Firewall connection rules with group policy firewall rules for the Public profile",
"function": "Firewall",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Controls whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy. This recommendation is not applicable to Azure virtual machines.",
"impact": 5
},
"scid-52": {
"platform": "Windows",
"name": "Enable 'Apply UAC restrictions to local accounts on network logons'",
"function": "OS",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "With User Account Control enabled, filtering the privileged token for built-in administrator accounts will prevent the elevated privileges of these accounts from being used over the network. This recommendation is not applicable for organizations which use local password management solution (like LAPS) to protect local accounts for remote administration and support.",
"impact": 5
},
"scid-53": {
"platform": "Windows",
"name": "Disable SMBv1 client driver",
"function": "Network",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Disabling SMBv1 support may prevent access to file or print sharing resources with systems or devices that only support SMBv1.",
"impact": 8
},
"scid-54": {
"platform": "Windows",
"name": "Disable SMBv1 server",
"function": "Network",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Disabling SMBv1 support may prevent access to file or print sharing resources with systems or devices that only support SMBv1.",
"impact": 8
},
"scid-55": {
"platform": "Windows",
"name": "Disable 'Network access: Let Everyone permissions apply to anonymous users'",
"function": "Network",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether anonymous network users have the same rights and permissions as the built-in 'Everyone' group.. This security control is only assessed for machines on Windows 10, version 1709 or later.",
"impact": 5
},
"scid-57": {
"platform": "Windows",
"name": "Disable 'WDigest Authentication'",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "When the WDigest Authentication protocol is enabled, plain text passwords are stored in the Local Security Authority Subsystem Service (LSASS) exposing them to theft.",
"impact": 5
},
"scid-58": {
"platform": "Windows",
"name": "Disable 'Installation and configuration of Network Bridge on your DNS domain network'",
"function": "Network",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether a user can install and configure the Network Bridge. The Network Bridge allows users to create a layer 2 MAC bridge, enabling them to connect two or more network segments together.",
"impact": 5
},
"scid-59": {
"platform": "Windows",
"name": "Enable 'Require domain users to elevate when setting a network's location'",
"function": "Network",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether to require domain users to elevate when setting a network's location.",
"impact": 2
},
"scid-60": {
"platform": "Windows",
"name": "Prohibit use of Internet Connection Sharing on your DNS domain network",
"function": "Network",
"compliance": {
"0": "Allowed",
"1": "Restricted"
},
"crossPlatform": null,
"description": "Determines whether an existing internet connection, such as through wireless, can be shared and used by other systems essentially creating a mobile hotspot.",
"impact": 5
},
"scid-61": {
"platform": "Windows",
"name": "Set 'Minimum PIN length for startup' to '6 or more characters'",
"function": "OS",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines the minimum PIN length for authentication without sending a password to a network where it could be compromised.",
"impact": 5
},
"scid-62": {
"platform": "Windows",
"name": "Enable 'Require additional authentication at startup'",
"function": "OS",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether BitLocker requires additional authentication each time the computer starts, and whether you are using BitLocker with or without a Trusted Platform Module (TPM).",
"impact": 8
},
"scid-63": {
"platform": "Windows",
"name": "Disable 'Configure Offer Remote Assistance'",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether unsolicited offers of help to this computer via Remote Assistance are allowed. Help desk and support personnel will not be able to proactively offer assistance, although they can still respond to user assistance requests.",
"impact": 5
},
"scid-64": {
"platform": "Windows",
"name": "Restrict anonymous access to named pipes and Shares",
"function": "Network",
"compliance": {
"0": "Allowed",
"1": "Restricted"
},
"crossPlatform": null,
"description": "Determines whether anonymous access is restricted to only shares and pipes that are named.",
"impact": 8
},
"scid-65": {
"platform": "Windows",
"name": "Disable 'Store LAN Manager hash value on next password change'",
"function": "Network",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Controls whether or not a LAN Manager hash of the password is stored in the SAM the next time the password is changed.",
"impact": 8
},
"scid-66": {
"platform": "Windows",
"name": "Disable 'Always install with elevated privileges'",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether Windows Installer always elevates privileges when installing applications.",
"impact": 8
},
"scid-67": {
"platform": "Windows",
"name": "Disable 'Autoplay for non-volume devices'",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether autoplay for non-volume devices (such as Media Transfer Protocol (MTP) devices) is enabled or disabled.",
"impact": 5
},
"scid-68": {
"platform": "Windows",
"name": "Disable 'Anonymous enumeration of SAM accounts'",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Controls the ability of anonymous users to enumerate the accounts in the Security Accounts Manager (SAM). If you enable this policy setting, users with anonymous connections will not be able to enumerate domain account user names on the systems in your environment.",
"impact": 8
},
"scid-69": {
"platform": "Windows",
"name": "Disable 'Autoplay' for all drives",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether Autoplay is enabled on the device. Autoplay starts to read from a drive as soon as you insert media in the drive, which causes the setup file for programs or audio media to start immediately",
"impact": 8
},
"scid-70": {
"platform": "Windows",
"name": "Set default behavior for 'AutoRun' to 'Enabled: Do not execute any autorun commands'",
"function": "OS",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines whether Autorun commands are allowed to execute. Autorun commands are generally stored in autorun.inf files. They often launch the installation program or other routines.",
"impact": 8
},
"scid-71": {
"platform": "Windows",
"name": "Enable 'Limit local account use of blank passwords to console logon only'",
"function": "Accounts",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. By enabling this configuration, local accounts that have blank passwords will not be able to log on to the network from remote client computers. Such accounts will only be able to log on at the keyboard of the computer.",
"impact": 5
},
"scid-72": {
"platform": "Windows",
"name": "Set LAN Manager authentication level to 'Send NTLMv2 response only. Refuse LM & NTLM'",
"function": "Network",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines which challenge/response authentication protocol is used for network logons. This choice affects the level of authentication protocol used by clients, the level of session security negotiated, and the level of authentication accepted by servers.",
"impact": 8
},
"scid-73": {
"platform": "Windows",
"name": "Disable 'Allow Basic authentication' for WinRM Client",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether the Windows Remote Management (WinRM) client uses Basic authentication.",
"impact": 8
},
"scid-74": {
"platform": "Windows",
"name": "Disable 'Allow Basic authentication' for WinRM Service",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether the Windows Remote Management (WinRM) service accepts Basic authentication.",
"impact": 8
},
"scid-80": {
"platform": "Windows",
"name": "Block Flash activation in Office documents",
"function": "Microsoft Office",
"compliance": {
"0": "Allowed",
"1": "Blocked"
},
"crossPlatform": null,
"description": "Determines whether Flash can be used in office documents.",
"impact": 5
},
"scid-81": {
"platform": "Windows",
"name": "Set IPv6 source routing to highest protection",
"function": "Network",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Determines whether IPv6 source routing is enabled.",
"impact": 5
},
"scid-82": {
"platform": "Windows",
"name": "Disable IP source routing",
"function": "Network",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether IP source routing is enabled.",
"impact": 5
},
"scid-83": {
"platform": "Windows",
"name": "Enable Explorer Data Execution Prevention (DEP)",
"function": "OS",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether Data Execution Prevention can be turned off for File Explorer.",
"impact": 5
},
"scid-87": {
"platform": "Windows",
"name": "Disable Solicited Remote Assistance",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Remote assistance allows another user to view or take control of the local session of a user. Solicited assistance is help that is specifically requested by the local user.",
"impact": 8
},
"scid-88": {
"platform": "Windows",
"name": "Disable Anonymous enumeration of shares",
"function": "OS",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether anonymous logon users (null session connections) are allowed to list all account names and enumerate all shared resources",
"impact": 8
},
"scid-89": {
"platform": "Windows",
"name": "Enable scanning of removable drives during a full scan",
"function": "Antivirus",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "This setting controls whether or not to scan for malicious software and unwanted software in the contents of removable drives, such as USB flash drives, when running a full scan. This security control is only applicable for machines with Windows 10, version 1709 or later.",
"impact": 8
},
"scid-90": {
"platform": "Windows",
"name": "Enable Microsoft Defender Antivirus email scanning",
"function": "Antivirus",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether Microsoft Defender Antivirus analyzes the mail bodies and attachments and scans them for malicious content. MDMWinsOverGP configuration is not supported.",
"impact": 9
},
"scid-91": {
"platform": "Windows",
"name": "Enable Microsoft Defender Antivirus real-time behavior monitoring",
"function": "Antivirus",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether Microsoft Defender Antivirus monitors file processes, file and registry changes, and other events on your endpoints for suspicious and known malicious activity.",
"impact": 5
},
"scid-92": {
"platform": "Windows",
"name": "Enable Microsoft Defender Antivirus scanning of downloaded files and attachments",
"function": "Antivirus",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether Microsoft Defender Antivirus scans all downloaded files and attachments for malicious code.",
"impact": 10
},
"scid-93": {
"platform": "Windows",
"name": "Disable the local storage of passwords and credentials",
"function": "Accounts",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether Credential Manager saves passwords or credentials locally for later use when it gains domain authentication.",
"impact": 5
},
"scid-94": {
"platform": "Windows",
"name": "Disable sending unencrypted password to third-party SMB servers",
"function": "Network",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether the SMB redirector will send unencrypted (plain text) passwords when authenticating to third-party SMB servers that do not support password encryption.",
"impact": 5
},
"scid-95": {
"platform": "Windows",
"name": "Enable 'Microsoft network client: Digitally sign communications (always)'",
"function": "Network",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether packet signing is required by the SMB client component. If this is enabled, the SMB client will only communicate with an SMB server that performs SMB packet signing.",
"impact": 5
},
"scid-96": {
"platform": "Windows",
"name": "Enable 'Network Protection'",
"function": "Network",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. It expands the scope of Windows Defender SmartScreen to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources (based on the domain or hostname) This security control is only assessed for machines with Windows...",
"impact": 8
},
"scid-97": {
"platform": "Windows",
"name": "Disable JavaScript on Adobe DC",
"function": "Adobe Acrobat",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "Determines whether to globally disable and lock JavaScript execution in Adobe DC",
"impact": 5
},
"scid-102": {
"platform": "Windows",
"name": "Enable 'Local Security Authority (LSA) protection' on Windows 11 22h2 and higher",
"function": "OS",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Forces LSA to run as Protected Process Light (PPL). Set value to 1 to enable LSA protection with a UEFI variable, Set value to 2 to enable LSA protection without a UEFI variable, only enforced on Windows 11 version 22H2 and later.",
"impact": 8
},
"scid-103": {
"platform": "Windows",
"name": "Require LDAP client signing to prevent tampering and protect directory authentication",
"function": "Network",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Enforcing LDAP client signing requires all LDAP requests from clients to be cryptographically signed. This ensures the integrity and authenticity of LDAP traffic, confirming it hasn’t been altered in transit and that it originates from a trusted source. Without this setting, attackers can perform man-in-the-middle attacks and inject or manipulate LDAP communications, potentially leading to privilege escalation or unauthorized actions. Note on productivity impact: Some environments may still r...",
"impact": 7
},
"scid-104": {
"platform": "Windows",
"name": "Encrypt LDAP client traffic to protect sensitive data in transit",
"function": "Network",
"compliance": {
"0": "Not Encrypted",
"1": "Encrypted"
},
"crossPlatform": null,
"description": "Enabling LDAP client confidentiality ensures that data exchanged between clients and Active Directory servers is encrypted and sealed. This protects sensitive directory information, such as usernames, group membership, and credentials, from being exposed over the network. While attackers can observe encrypted traffic, they cannot read or manipulate it, significantly reducing the risk of data leakage. Note on productivity impact: Some environments may still rely on LDAP for certain processes. ...",
"impact": 7
},
"scid-105": {
"platform": "Windows",
"name": "Enforce LDAP channel binding to protect authentication sessions from interception",
"function": "Network",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "Channel binding ties the LDAP authentication layer to the underlying secure TLS channel, protecting against attacks that spoof or hijack sessions. It ensures that both ends of the connection verify the security context and that the client is communicating with the intended server. This setting helps enforce session integrity, particularly for LDAPS connections, by mitigating credential replay and man-in-the-middle risks. Note on productivity impact: Some environments may still rely on LDAP fo...",
"impact": 7
},
"scid-106": {
"platform": "Windows",
"name": "Require LDAP server signing to ensure integrity of directory traffic",
"function": "Network",
"compliance": {
"0": "Not Configured",
"1": "Configured"
},
"crossPlatform": null,
"description": "This configuration enforces that LDAP servers (e.g., domain controllers) require signed requests from clients. Signing validates the integrity and origin of LDAP traffic, preventing tampering or spoofing of authentication requests. While attackers can still observe traffic, they cannot alter it without detection, reducing the chance of credential tampering or injection attacks. Note on productivity impact: Some environments may still rely on LDAP for certain processes. More details on how to ...",
"impact": 8
},
"scid-108": {
"platform": "Windows",
"name": "Disable Remote Registry Service on Windows",
"function": "Services",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "The Remote Registry service allows remote users to read and modify registry settings over the network. You can disable this service to reduce the remote attack surface, and to prevent unauthorized configuration changes, privilege escalation, and lateral movement. When Remote Registry is enabled, attackers can remotely connect to the registry of a device and alter security controls, establish persistence, or weaken defenses. Productivity considerations: When you disable Remote Registry, this m...",
"impact": 8
},
"scid-109": {
"platform": "Windows",
"name": "Disable NTLM authentication for Windows workstations",
"function": "Network",
"compliance": {
"0": "Enabled",
"1": "Disabled"
},
"crossPlatform": null,
"description": "NTLM is an outdated and insecure authentication protocol that can be exploited through attacks such as Pass-the-Hash and NTLM relay. Modern alternatives like Kerberos offer stronger security and should be enforced wherever possible. This recommendation identifies systems that still allow NTLM and provides guidance to fully disable NTLM authentication. Without this setting, attackers can bypass password complexity, perform lateral movements using legitimate authentication, potentially resultin...",
"impact": 8
},
"scid-110": {
"platform": "Windows",
"name": "Block file transfer over RDP",
"function": "Shares",
"compliance": {
"0": "Allowed",
"1": "Blocked"
},
"crossPlatform": null,
"description": "Remote Desktop Protocol (RDP) enables remote access to devices, including the ability to transfer files between remote and local machines. Blocking the ability to transfer files over RDP reduces the risk of data exfiltration and prevents attackers from moving malicious files into the environment. Without this setting, attackers can use RDP sessions to bypass security controls and transfer sensitive data or malware.",
"impact": 7
},
"scid-111": {
"platform": "Windows",
"name": "SMB server security hardening against authentication relay attacks",
"function": "Security Control",
"compliance": {
"0": "Non-Compliant",
"1": "Compliant"
},
"crossPlatform": null,
"description": "To block credential relay attacks, Extended Protection for Authentication (EPA) enforces SPN validation and channel binding. This ensures that authentication is bound to the correct service, and block attacks. To add integrity and confidentiality, Defender Vulnerability Management uses: * Server Message Block (SMB) signing to verify message authenticity and prevent tampering during transit. * SMB encryption to protect sensitive or untrusted networks, by encrypting SMB traffic end-to-end. With...",
"impact": 8
},
"scid-2000": {
"platform": "Windows",
"name": "Turn on Microsoft Defender for Endpoint sensor",
"function": "EDR",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether the Microsoft Defender for Endpoint sensor embedded in Windows collect and process behavioral signals from the operating system and sends this sensor data to your private, isolated, cloud instance of Microsoft Defender for Endpoint",
"impact": 10
},
"scid-2001": {
"platform": "Windows",
"name": "Fix Microsoft Defender for Endpoint sensor data collection",
"function": "EDR",
"compliance": {
"0": "Issues",
"1": "Working"
},
"crossPlatform": [
"scid-6001"
],
"description": "The Microsoft Defender for Endpoint service relies on sensor data collection to determine the security state of a machine.",
"impact": 10
},
"scid-2002": {
"platform": "Windows",
"name": "Fix Microsoft Defender for Endpoint impaired communications",
"function": "EDR",
"compliance": {
"0": "Issues",
"1": "Working"
},
"crossPlatform": [
"scid-6002"
],
"description": "This status indicates that there's limited communication between the machine and the Microsoft Defender for Endpoint service.",
"impact": 10
},
"scid-2003": {
"platform": "Windows",
"name": "Turn on Tamper Protection",
"function": "Antivirus",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Tamper Protection essentially locks Microsoft Defender for Endpoint and prevents your security settings from being changed through apps and methods such as editing registry values, changing settings through PowerShell cmdlets and editing or removing security settings through group policies. This security control is only applicable for machines with Windows 10, version 1709 or later.",
"impact": 8
},
"scid-2010": {
"platform": "Windows",
"name": "Turn on Microsoft Defender Antivirus",
"function": "Antivirus",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,
"description": "Determines whether Microsoft Defender Antivirus is configured to run and scan for malware and other potentially unwanted software.",
"impact": 10
},
"scid-2011": {
"platform": "Windows",
"name": "Update Microsoft Defender Antivirus definitions",
"function": "Antivirus",
"compliance": {
"0": "Outdated",
"1": "Updated"
},
"crossPlatform": [
"scid-6095"
],
"description": "This status indicates that Microsoft Defender Antivirus definitions are not up to date.",
"impact": 9
},
"scid-2012": {
"platform": "Windows",
"name": "Turn on real-time protection",
"function": "Antivirus",
"compliance": {
"0": "Disabled",
"1": "Enabled"
},
"crossPlatform": null,