You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Checks that FileVault is enabled. FileVault secures a system's data by automatically encrypting its boot volume and requiring a password or recovery key to access it. This policy checks that filevault is enabled on the device and that the user is not allowed to disable it.
Note: This Group Policy path may not exist by default. It is provided by the Group Policy template ControlPanelDisplay.admx/adml that is included with the Microsoft Windows 7 & Server 2008 R2 Administrative Templates (or newer).
12
+
query: |
13
+
SELECT 1 FROM registry WHERE path LIKE 'HKEY_USERS\%\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop\ScreenSaveActive' and data = 1;
This setting specifies how much user idle time must elapse before the screen saver is launched.
18
+
The recommended state for this setting is: Enabled: 900 seconds or fewer, but not 0. Note: This setting has no effect under the following circumstances:
19
+
- The wait time is set to zero.
20
+
- The "Enable Screen Saver" setting is disabled.
21
+
- A valid screen existing saver is not selected manually or via the "Screen saver executable name" setting
22
+
resolution: |
23
+
To establish the recommended configuration via GP, set the following UI path to Enabled: 900 or fewer, but not 0:
Note: This Group Policy path may not exist by default. It is provided by the Group Policy template ControlPanelDisplay.admx/adml that is included with the Microsoft Windows 7 & Server 2008 R2 Administrative Templates (or newer).
26
+
query: |
27
+
SELECT 1 FROM registry WHERE path LIKE 'HKEY_USERS\%\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop\ScreenSaveTimeOut' AND data <=1200 AND data > 0 ;
28
+
- name: Windows - CIS - Ensure BitLocker is enabled
29
+
platform: windows
30
+
description: Full Disk Encryption (FDE) reduces the risk of compromise when a device is lost or stolen. This query lists any system that does not have BitLocker enabled on its OS drive (typically C:).
31
+
resolution: Ask your system administrator to turn on disk encryption in Fleet
32
+
query: SELECT * FROM bitlocker_info WHERE drive_letter='C:' AND protection_status != 1;
33
+
- name: Windows - CIS - Ensure guest account is disabled
34
+
platform: windows
35
+
description: |
36
+
This policy setting determines whether the Guest account is enabled or disabled. The Guest account allows unauthenticated network users to gain access to the system.
37
+
resolution: |
38
+
Automatic method:
39
+
Ask your system administrator to establish the recommended configuration via GP, set the following UI path to 'Disabled':
SELECT 1 FROM mdm_bridge where mdm_command_input = "<SyncBody><Get><CmdID>1</CmdID><Item><Target><LocURI>./Device/Vendor/MSFT/Policy/Result/LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus</LocURI></Target></Item></Get></SyncBody>" and mdm_command_output == 0;
43
+
- name: Windows - CIS - Ensure password is required to wake the computer from screen saver is enabled
44
+
platform: windows
45
+
description: |
46
+
This setting determines whether screen savers used on the computer are password protected.
47
+
The recommended state for this setting is: Enabled.
48
+
resolution: |
49
+
To establish the recommended configuration via GP, set the following UI path to Enabled:
50
+
'User Configuration\Policies\Administrative Templates\Control Panel\Personalization\Password protect the screen saver'
51
+
Note: This Group Policy path is provided by the Group Policy template ControlPanelDisplay.admx/adml that is included with all versions of the Microsoft Windows Administrative Templates.
52
+
query: |
53
+
SELECT 1 FROM registry WHERE path LIKE 'HKEY_USERS\%\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop\ScreenSaverIsSecure' and data = 1;
54
+
- name: Windows - CIS - Ensure Remote Desktop is disabled
55
+
platform: windows
56
+
description: |
57
+
This policy setting allows you to configure remote access to computers by using Remote Desktop Services.
58
+
resolution: |
59
+
To establish the recommended configuration via GP, set the following UI path to 'Disabled':
60
+
'Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections\Allow users to connect remotely by using Remote Desktop Services'
61
+
query: |
62
+
SELECT 1 FROM registry WHERE (path = 'HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows NT\\Terminal Services\\fDenyTSConnections' AND data = 1);
63
+
- name: Windows - CIS - Ensure Remote Management is set to disabled
64
+
platform: windows
65
+
description: |
66
+
The Windows Remote Management (WinRM) service implements the WS-Management protocol for remote
67
+
management. WS-Management is a standard web services protocol used for remote software and
68
+
hardware management. The WinRM service listens on the network for WS-Management requests and processes them.
69
+
resolution: |
70
+
Automatic method:
71
+
Ask your system administrator to establish the recommended configuration via domain GP, set the following UI path to 'Disabled':
0 commit comments