Checklist Details for Windows Server 2008 STIG Version 6, Release 1.28

(Archived Revisions)

Checklist Highlights

Checklist Name:
Windows Server 2008 STIG
Version:
Version 6, Release 1.28
Tier:
III
Review Status:
Final
Authority:
Governmental Authority: Defense Information Systems Agency
Target Product:
Target Product CPE Name Product Category
Microsoft Windows Defender cpe:/a:microsoft:windows_defender (View CVEs)
  • Malware
Microsoft Internet Explorer cpe:/a:microsoft:ie (View CVEs)
  • Web Browser
Microsoft Windows Mail cpe:/a:microsoft:windows_mail (View CVEs)
  • Desktop Application
Microsoft Windows Media Player cpe:/a:microsoft:windows_media_player (View CVEs)
  • Desktop Application
Microsoft Windows Server 2008 cpe:/o:microsoft:windows_server_2008:- (View CVEs)
  • Operating System
Checklist Summary:
The Windows Server 2008 Security Checklist is composed of three major sections and several appendices. The organizational breakdown proceeds as follows: Section 1 - Introduction This section contains summary information about the sections and appendices that comprise the Windows Server 2008 Security Checklist, and defines its scope. Supporting documents consulted are listed in this section. Section 2 - Automated System Check Procedures The Gold Disk does not support Windows 2008 at this time. Section 3 - Manual System Check Procedures This section documents the procedures that instruct the reviewer on how to perform an SRR manually, and to interpret the program output for vulnerabilities. Appendix A - Object Permissions This appendix documents the any additional Access Control Lists (ACLs) for file and registry objects. The tables contained in this section are referenced in Section 3. Appendix B - Joint Task Force Global Network Operations (JTF-GNO) Information Assurance Vulnerability Management (IAVM) Compliance This appendix contains checks for IAVM compliance to be done against a Windows Server 2008 machine. Appendix C - MS Group Policy Analysis Tools This appendix provides information for the use of Microsoft tools for analyzing group policy. Appendix D - Windows VMS Asset Creation and Findings Import Procedures for Reviewers and Self Assessments This appendix documents the procedures for creating assets and importing findings into VMS 6.0 Appendix E - Joint Task Force - Global Network Operations (JTF-GNO) Communications Tasking Orders (CTO) Compliance This appendix identifies Windows specific requirements from JTF-GNO CTOs. Appendix F - SRR Result Report This section is the matrix that allows the reviewer to document vulnerabilities discovered during the SRR process. The entries in this table are mapped to procedures, referenced by Vulnerability and STIG IDs in Sections 3 and Appendix B.
Checklist Role:
  • Malware
  • Web Browser
  • Desktop Application
  • Operating System
Known Issues:
Not provided.
Target Audience:
This document is designed to instruct the reviewer on how to assess Windows Server 2008 configurations in Windows domains. In addition, the security settings recommended can also be used to configure Group Policy in a Windows Active Directory environment.
Testing Information:
Not provided.
Regulatory Compliance:
Not provided.
Disclaimer:
Not provided.
Product Support:
Not provided.
Point of Contact:
Not provided.
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Version 6, Release 1.28 - 25 July 2014 (SCAP 1.0)
Version 6, Release 1.27 - 25 April 2014
Version 6, Release 1.26 - 13 March 2014
Version 6, Release 1.25 - 24 January 2014
Version 6, Release 1.24 - 23 December 2013
Version 6, Release 1.23 - 25 October 2013
Version 6, Release 1.22 - 24 July 2013
Version 6, Release 1.21 - 29 March 2013
Version 6, Release 1.20 - 26 October 2012
Version 6, Release 1.19 - 27 July 2012
Version 6, Release 1.18 - 27 April 2012
Version 6, Release 1.17 - 24 January 2012
Version 6, Release 1.16 - 28 October 2011
Version 6, Release 1.15 - 29 July 2011
NIST checklist record last modified on 09/04/2014