Difference between revisions of "KHIKA Standard Hardening Policies"
Jump to navigation
Jump to search
(Created page with " == KHIKA Server Hardening for Windows Servers == The Policies and rules available in the default Server Hardening template provided by KHIKA for Windows Servers (2007 onward...") |
|||
Line 27: | Line 27: | ||
| || Guest Account Enable/Disable - Denotes whether the Guest account is enabled or disabled. || Disabled | | || Guest Account Enable/Disable - Denotes whether the Guest account is enabled or disabled. || Disabled | ||
|- | |- | ||
− | | | + | | Audit Policy || Audit System Events - Audit when a user restarts or shuts down the computer or when an event occurs that affects either the system security or the security log. || Audit Success & Failure |
|- | |- | ||
− | | Example || | + | | Example || Audit Logon Events - Audit each instance of a user logging on to or logging off from a computer. || Audit Success & Failure |
|- | |- | ||
− | | Example || | + | | Example || Audit Object Access - Audit the event of a user accessing an object. || No Audit |
|- | |- | ||
− | | Example || | + | | Example || Audit Privilege Use - Audit each instance of a user exercising a user right. || Audit Success & Failure |
|- | |- | ||
− | | Example || | + | | Example || Audit Policy Change - Audit every incident of a change to user rights assignment policies, audit policies, or trust policies. || Audit Success & Failure |
|- | |- | ||
− | | Example || | + | | Example || Audit Account Manage - Audit each event of account management on a computer. || Audit Success & Failure |
|- | |- | ||
− | | Example || | + | | Example || Audit Process Tracking - Audit detailed tracking information for events such as program activation, process exit, handle duplication, and indirect object access. || No Audit |
|- | |- | ||
− | | Example || | + | | Example || Audit Directory Services Access - Audit each instance of user attempts to access an Active Directory object. || No Audit |
|- | |- | ||
− | | Example || | + | | Example || Audit Account Logon - Audit each time this computer validates the credentials of an account. || Audit Success & Failure |
|- | |- | ||
| Example || Example || Example | | Example || Example || Example |
Revision as of 06:44, 14 June 2019
KHIKA Server Hardening for Windows Servers
The Policies and rules available in the default Server Hardening template provided by KHIKA for Windows Servers (2007 onwards) is as mentioned below:
Policy Name | Rule Name and Description | Desired Value |
---|---|---|
Account & Password Policy | Password Age Minimum - Number of days for which user must use password before it can be changed. | 1 Day |
Password Age Maximum - Number of days after which password expires. | 45 Days | |
Password Length Minimum - The least number of characters that can make up a password for a user account. | 8 Characters | |
Password Complexity level - Denotes whether password complexity is enabled. | Enabled | |
Password History count - The number of unique new passwords that have to be associated with a user account before an old password can be reused. | 5 passwords | |
Password lock out count - Number of failed logon attempts after which a user account MUST be locked out. | 5 attempts | |
Administrator Name - Denotes Administrator Account Name. | Administrator | |
Password in clear text - Determines whether passwords are stored using reverse encryption . | Disabled | |
Guest Account Enable/Disable - Denotes whether the Guest account is enabled or disabled. | Disabled | |
Audit Policy | Audit System Events - Audit when a user restarts or shuts down the computer or when an event occurs that affects either the system security or the security log. | Audit Success & Failure |
Example | Audit Logon Events - Audit each instance of a user logging on to or logging off from a computer. | Audit Success & Failure |
Example | Audit Object Access - Audit the event of a user accessing an object. | No Audit |
Example | Audit Privilege Use - Audit each instance of a user exercising a user right. | Audit Success & Failure |
Example | Audit Policy Change - Audit every incident of a change to user rights assignment policies, audit policies, or trust policies. | Audit Success & Failure |
Example | Audit Account Manage - Audit each event of account management on a computer. | Audit Success & Failure |
Example | Audit Process Tracking - Audit detailed tracking information for events such as program activation, process exit, handle duplication, and indirect object access. | No Audit |
Example | Audit Directory Services Access - Audit each instance of user attempts to access an Active Directory object. | No Audit |
Example | Audit Account Logon - Audit each time this computer validates the credentials of an account. | Audit Success & Failure |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |