@@ -303,29 +303,6 @@ wn11_uc_000015: true
303303
304304# CAT1
305305
306- # WN11-00-000030
307- # win11stig_enable_bitlocker_on_all_drives enables Ansible to enforce BitLocker
308- # to encrypt all fixed data drives to protect the confidentiality and integrity of
309- # information at rest. Set this to true to enforce BitLocker across all drives.
310- # By default, this is false to allow the use of an alternate full disk encryption
311- # solution (e.g., one that meets pre-boot authentication requirements per
312- # WN11-00-000031 and WN11-00-000032).
313- # Default: false
314- win11stig_enable_bitlocker_on_all_drives : false
315- # The TPM PIN to use for BitLocker protection. This will be used when enabling
316- # TPM+PIN startup authentication. Ensure this meets your organization's policy
317- # for minimum PIN length (typically 6–20 numeric characters). If the PIN does not
318- # meet Group Policy requirements, BitLocker will fail to enable.
319- # Default: 12345678
320- win11stig_bitlocker_pin : " 12345678"
321- # The encryption method to use for BitLocker. Must be one of:
322- # - Aes128 – AES with a 128-bit key (CBC mode; legacy)
323- # - Aes256 – AES with a 256-bit key (CBC mode; legacy)
324- # - XtsAes128 – AES with a 128-bit key in XTS mode (recommended)
325- # - XtsAes256 – AES with a 256-bit key in XTS mode (recommended)
326- # Default: XtsAes256
327- win11stig_bitlocker_encryption_method : " XtsAes256"
328-
329306# WN11-00-000031
330307# win11stig_bitlocker_network_unlock is the setting that will make the necessary adjustments
331308# to the registry for bitlocker unlocking over the network.
@@ -420,7 +397,7 @@ wn11stig_internet_based_apps_to_check:
420397 - " chromedriver.exe"
421398
422399# CAT2
423- # testing
400+
424401# WN11-00-000025
425402# win11stig_ess_software is the name and service that will be running on the machine that is used
426403# for continuous network scanning and must be installed and configured to run.
0 commit comments