Skip to content

Commit 72f7a5c

Browse files
committed
Copilot Recommended Changes
1 parent fa8077a commit 72f7a5c

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

source/StigData/Processed/WindowsServer-2019-MS-3.6.xml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2667,7 +2667,7 @@ Inherited from - "None" for all
26672667
Principal - Access - Applies to
26682668
SYSTEM - Full Control - This key and subkeys
26692669
Administrators - Special - This key and subkeys
2670-
Server Operators – Read – This Key and subkeys (Domain controllers only)
2670+
Server Operators - Read - This Key and subkeys (Domain controllers only)
26712671
Other examples under the noted keys may also be sampled. There may be some instances where non-privileged groups have greater than Read permission.
26722672
Microsoft has given Read permission to the SOFTWARE and SYSTEM registry keys in Windows Server 2019 to the following SID, this is currently not a finding.
26732673
S-1-15-3-1024-1065365936-1281604716-3511738428-1654721687-432734479-3232135806-4053264122-3456934681
@@ -5564,15 +5564,15 @@ Verify if Windows Defender is in use or enabled:
55645564

55655565
Open "PowerShell".
55665566

5567-
Enter “get-service | where {$_.DisplayName -Like "*Defender*"} | Select Status,DisplayName”
5567+
Enter "get-service | where {$_.DisplayName -Like "*Defender*"} | Select Status,DisplayName"
55685568

55695569
Verify if third-party anti-virus is in use or enabled:
55705570

55715571
Open "PowerShell".
55725572

5573-
Enter "get-service | where {$_.DisplayName -Like "*mcafee*"} | Select Status,DisplayName”
5573+
Enter "get-service | where {$_.DisplayName -Like "*mcafee*"} | Select Status,DisplayName"
55745574

5575-
Enter "get-service | where {$_.DisplayName -Like "*symantec*"} | Select Status,DisplayName”
5575+
Enter "get-service | where {$_.DisplayName -Like "*symantec*"} | Select Status,DisplayName"
55765576
</RawString>
55775577
<ServiceName>
55785578
</ServiceName>

source/StigData/Processed/WindowsServer-2022-DC-2.6.org.default.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ By using this IS (which includes any device attached to this IS), you consent to
7979
<!-- Ensure ''V-254290'' -ne '0'-->
8080
<OrganizationalSetting id="V-254290" PolicyValue="1" />
8181
<!-- Ensure ''V-254291'' -ge '14'-->
82-
<OrganizationalSetting id="V-254291" PolicyValue="14 " />
82+
<OrganizationalSetting id="V-254291" PolicyValue="14" />
8383
<!-- Ensure ''V-254447'' -ne 'Administrator'-->
8484
<OrganizationalSetting id="V-254447" OptionValue="" />
8585
<!-- Ensure ''V-254448'' -ne 'Guest'-->

source/StigData/Processed/WindowsServer-2022-MS-2.6.org.default.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@
2323
<!-- Ensure ''V-254360'' -ge '32768'-->
2424
<OrganizationalSetting id="V-254360" ValueData="32768" />
2525
<!-- Ensure ''V-254432'' -le '4'-->
26-
<OrganizationalSetting id="V-254432" ValueData=" 4" />
26+
<OrganizationalSetting id="V-254432" ValueData="4" />
2727
<!-- Ensure location for DoD Root CA 3 certificate is present-->
2828
<OrganizationalSetting id="V-254442.a" Location="" />
2929
<!-- Ensure location for DoD Root CA 4 certificate is present-->

source/StigData/Processed/WindowsServer-2022-MS-2.6.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1141,7 +1141,7 @@ Select "Disk Management" under "Storage".
11411141
For each local volume, if the file system does not indicate "NTFS", this is a finding.
11421142

11431143
"ReFS" (resilient file system) is also acceptable and is not a finding.
1144-
CSV ( Cluster Shared Volumes) is not a finding.
1144+
CSV (Cluster Shared Volumes) is not a finding.
11451145

11461146
This does not apply to system partitions such the Recovery and EFI System Partition.</RawString>
11471147
</Rule>
@@ -1308,7 +1308,7 @@ Navigate to Local Computer Policy &gt;&gt; Computer Configuration &gt;&gt; Admin
13081308

13091309
Verify LAPS Operational logs &gt;&gt; Event Viewer &gt;&gt; Applications and Services Logs &gt;&gt; Microsoft &gt;&gt; Windows &gt;&gt; LAPS &gt;&gt; Operational. Verify LAPS policy process is completing. If it is not, this is a finding.
13101310

1311-
If the server is not a member of a domain this not applicable.</RawString>
1311+
If the server is not a member of a domain, this not applicable.</RawString>
13121312
</Rule>
13131313
<Rule id="V-254240" severity="high" conversionstatus="pass" title="SRG-OS-000480-GPOS-00227" dscresource="None">
13141314
<Description>&lt;VulnDiscussion&gt;Using applications that access the internet or have potential internet sources using administrative privileges exposes a system to compromise. If a flaw in an application is exploited while running as a privileged user, the entire system could be compromised. Web browsers and email are common attack vectors for introducing malicious code and must not be run with an administrative account.

0 commit comments

Comments
 (0)