diff --git a/ee/cis/win-11-intune/l1_win11_intune.yaml b/ee/cis/win-11-intune/l1_win11_intune.yaml index fb4687f20a..74c2b6dab1 100644 --- a/ee/cis/win-11-intune/l1_win11_intune.yaml +++ b/ee/cis/win-11-intune/l1_win11_intune.yaml @@ -713,8 +713,8 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''Configure RPC connection settings: Use authentication for outgoing RPC connections'' is set to ''Enabled: Default''' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Rpc\EnableAuthEpResolution' AND data = '1'; + name: CIS - Ensure 'Configure RPC connection settings - Use authentication for outgoing RPC connections' is set to 'Enabled to Default' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Rpc\RpcAuthentication' AND data = '1'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:configure-rpc-connection-settings-use-authentication-for-outgoing-rpc-connections-is-enabled-default, cis_safeguard_ids:CIS4.7.4 description: 'This policy setting controls which protocol and protocol settings to use for outgoing @@ -1407,7 +1407,7 @@ kind: policy spec: platform: windows name: CIS - Ensure 'Configure Offer Remote Assistance' is set to 'Disabled' - query: SELECT 1 FROM mdm_bridge WHERE mdm_command_input = '1./Device/Vendor/MSFT/Policy/Result/RemoteAssistance/SolicitedRemoteAssistance' AND mdm_command_output LIKE '%Disabled%'; + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\fAllowUnsolicited' AND data = '0'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:remote, requirement:standard, critical:false, control:configure-offer-remote-assistance-is-disabled, cis_safeguard_ids:CIS4.10.30.1 description: 'This policy setting allows you to turn on or turn off Offer (Unsolicited) Remote @@ -1880,61 +1880,20 @@ apiVersion: v1 kind: policy spec: platform: windows - name: CIS - Ensure 'Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\Security\Retention' AND data = '0'; + name: CIS - Ensure Application 'Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\Application\Retention' AND data = '0'; purpose: Informational - tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:control-event-log-behavior-when-the-log-file-reaches-its-maximum-size-is-disabled, cis_safeguard_ids:CIS4.11.15.1.1;CIS4.11.15.2.1;CIS4.11.15.3.1;CIS4.11.15.4.1 - description: '[4.11.15.1.1] - - This policy setting controls Event Log behavior when the log file reaches its maximum - - size. + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:control-event-log-behavior-when-the-log-file-reaches-its-maximum-size-is-disabled, cis_safeguard_ids:CIS4.11.15.1.1 + description: ' + This policy setting controls Event Log behavior when the log file reaches its maximumsize. The recommended state for this setting is: Disabled. Note: Old events may or may not be retained according to the Backup log automatically when full policy setting. - - - [4.11.15.2.1] - - This policy setting controls Event Log behavior when the log file reaches its maximum - - size. - - The recommended state for this setting is: Disabled. - - Note: Old events may or may not be retained according to the Backup log automatically - - when full policy setting. - - - [4.11.15.3.1] - - This policy setting controls Event Log behavior when the log file reaches its maximum - - size. - - The recommended state for this setting is: Disabled. - - Note: Old events may or may not be retained according to the Backup log automatically - - when full policy setting. - - - [4.11.15.4.1] - - This policy setting controls Event Log behavior when the log file reaches its maximum - - size. - - The recommended state for this setting is: Disabled. - - Note: Old events may or may not be retained according to the Backup log automatically - - when full policy setting.' - resolution: '[4.11.15.1.1] + ' + resolution: ' To establish the recommended configuration via configuration profiles, set the following @@ -1942,77 +1901,102 @@ spec: Administrative Templates\Windows Components\Event Log - Service\Application\Control Event Log behavior when the log file reaches its - - maximum size - - - [4.11.15.2.1] - - To establish the recommended configuration via configuration profiles, set the following - - Settings Catalog path to Disabled. - - Administrative Templates\Windows Components\Event Log - - Service\Security\Control Event Log behavior when the log file reaches its - - maximum size - - - [4.11.15.3.1] - - To establish the recommended configuration via configuration profiles, set the following - - Settings Catalog path to Disabled. - - Administrative Templates\Windows Components\Event Log Service\Setup\Control - - Event Log behavior when the log file reaches its maximum size - - - [4.11.15.4.1] - - To establish the recommended configuration via configuration profiles, set the following - - Settings Catalog path to Disabled. - - Administrative Templates\Windows Components\Event Log Service\System\Control - - Event Log behavior when the log file reaches its maximum size' + Service\Application\Control Event Log behavior when the log file reaches its maximum size + ' --- apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''Specify the maximum log file size (KB)'' is set to ''Enabled: 32,768 or greater''' + name: CIS - Ensure Security 'Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\Security\Retention' AND data = '0'; + purpose: Informational + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:control-event-log-behavior-when-the-log-file-reaches-its-maximum-size-is-disabled, cis_safeguard_ids:CIS4.11.15.2.1 + description: ' + This policy setting controls Event Log behavior when the log file reaches its maximumsize. + + The recommended state for this setting is: Disabled. + + Note: Old events may or may not be retained according to the Backup log automatically + + when full policy setting. + ' + resolution: ' + + To establish the recommended configuration via configuration profiles, set the following + + Settings Catalog path to Disabled. + + Administrative Templates\Windows Components\Event Log + + Service\Security\Control Event Log behavior when the log file reaches its maximum size + ' +--- +apiVersion: v1 +kind: policy +spec: + platform: windows + name: CIS - Ensure Event Log Setup 'Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\Setup\Retention' AND data = '0'; + purpose: Informational + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:control-event-log-behavior-when-the-log-file-reaches-its-maximum-size-is-disabled, cis_safeguard_ids:CIS4.11.15.3.1 + description: ' + This policy setting controls Event Log behavior when the log file reaches its maximumsize. + + The recommended state for this setting is: Disabled. + + Note: Old events may or may not be retained according to the Backup log automatically + + when full policy setting. + ' + resolution: ' + + To establish the recommended configuration via configuration profiles, set the following + + Settings Catalog path to Disabled. + + Administrative Templates\Windows Components\Event Log + + Service\Setup\Control Event Log behavior when the log file reaches its maximum size + ' +--- +apiVersion: v1 +kind: policy +spec: + platform: windows + name: CIS - Ensure System 'Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\System\Retention' AND data = '0'; + purpose: Informational + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:control-event-log-behavior-when-the-log-file-reaches-its-maximum-size-is-disabled, cis_safeguard_ids:CIS4.11.15.4.1 + description: ' + This policy setting controls Event Log behavior when the log file reaches its maximumsize. + + The recommended state for this setting is: Disabled. + + Note: Old events may or may not be retained according to the Backup log automatically + + when full policy setting. + ' + resolution: ' + + To establish the recommended configuration via configuration profiles, set the following + + Settings Catalog path to Disabled. + + Administrative Templates\Windows Components\Event Log + + Service\System\Control Event Log behavior when the log file reaches its maximum size + ' +--- +apiVersion: v1 +kind: policy +spec: + platform: windows + name: CIS - Ensure Application 'Specify the maximum log file size (KB) is set to Enabled and 32,768 or greater' query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\Application\MaxSize' AND CAST(data AS INTEGER) >= 32768; purpose: Informational - tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:specify-the-maximum-log-file-size-kb-is-enabled-32768-or-greater, cis_safeguard_ids:CIS4.11.15.1.2;CIS4.11.15.3.2;CIS4.11.15.4.2 - description: '[4.11.15.1.2] - - This policy setting specifies the maximum size of the log file in kilobytes. The maximum - - log file size can be configured between 1 megabyte (1,024 kilobytes) and 4 terabytes - - (4,194,240 kilobytes) in kilobyte increments. - - The recommended state for this setting is: Enabled: 32,768 or greater. - - - [4.11.15.3.2] - - This policy setting specifies the maximum size of the log file in kilobytes. The maximum - - log file size can be configured between 1 megabyte (1,024 kilobytes) and 4 terabytes - - (4,194,240 kilobytes) in kilobyte increments. - - The recommended state for this setting is: Enabled: 32,768 or greater. - - - [4.11.15.4.2] - + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:specify-the-maximum-log-file-size-kb-is-enabled-32768-or-greater, cis_safeguard_ids:CIS4.11.15.1.2 + description: ' This policy setting specifies the maximum size of the log file in kilobytes. The maximum log file size can be configured between 1 megabyte (1,024 kilobytes) and 4 terabytes @@ -2020,7 +2004,8 @@ spec: (4,194,240 kilobytes) in kilobyte increments. The recommended state for this setting is: Enabled: 32,768 or greater.' - resolution: '[4.11.15.1.2] + + resolution: ' To establish the recommended configuration via configuration profiles, set the following @@ -2028,29 +2013,61 @@ spec: Administrative Templates\Windows Components\Event Log - Service\Application\Specify the maximum log file size (KB) + Service\Application\Specify the maximum log file size (KB).' +--- +apiVersion: v1 +kind: policy +spec: + platform: windows + name: CIS - Ensure Setup 'Specify the maximum log file size (KB) is set to Enabled and 32,768 or greater' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\Setup\MaxSize' AND CAST(data AS INTEGER) >= 32768; + purpose: Informational + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:specify-the-maximum-log-file-size-kb-is-enabled-32768-or-greater, cis_safeguard_ids:CIS4.11.15.3.2 + description: ' + This policy setting specifies the maximum size of the log file in kilobytes. The maximum + log file size can be configured between 1 megabyte (1,024 kilobytes) and 4 terabytes - [4.11.15.3.2] + (4,194,240 kilobytes) in kilobyte increments. + + The recommended state for this setting is: Enabled: 32,768 or greater.' + + resolution: ' To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Enabled: 32,768 or greater. - Administrative Templates\Windows Components\Event Log Service\Setup\Specify + Administrative Templates\Windows Components\Event Log - the maximum log file size (KB) + Service\Setup\Specify the maximum log file size (KB).' +--- +apiVersion: v1 +kind: policy +spec: + platform: windows + name: CIS - Ensure System 'Specify the maximum log file size (KB) is set to Enabled and 32,768 or greater' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\System\MaxSize' AND CAST(data AS INTEGER) >= 32768; + purpose: Informational + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:specify-the-maximum-log-file-size-kb-is-enabled-32768-or-greater, cis_safeguard_ids:CIS4.11.15.4.2 + description: ' + This policy setting specifies the maximum size of the log file in kilobytes. The maximum + log file size can be configured between 1 megabyte (1,024 kilobytes) and 4 terabytes - [4.11.15.4.2] + (4,194,240 kilobytes) in kilobyte increments. + + The recommended state for this setting is: Enabled: 32,768 or greater.' + + resolution: ' To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Enabled: 32,768 or greater. - Administrative Templates\Windows Components\Event Log Service\System\Specify + Administrative Templates\Windows Components\Event Log - the maximum log file size (KB)' + Service\System\Specify the maximum log file size (KB).' --- apiVersion: v1 kind: policy @@ -2552,11 +2569,11 @@ apiVersion: v1 kind: policy spec: platform: windows - name: CIS - Ensure 'Allow Basic authentication' is set to 'Disabled' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service\AllowBasic' AND data = '0'; + name: CIS - Ensure Client 'Allow Basic authentication is set to Disabled' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WinRM\Client\AllowBasic' AND data = '0'; purpose: Informational - tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:allow-basic-authentication-is-disabled, cis_safeguard_ids:CIS4.11.55.1.1;CIS4.11.55.2.1 - description: '[4.11.55.1.1] + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:allow-basic-authentication-is-disabled, cis_safeguard_ids:CIS4.11.55.1.1 + description: ' This policy setting allows you to manage whether the Windows Remote Management @@ -2570,17 +2587,8 @@ spec: Exchange Online uses Basic authentication over HTTPS, and so the Exchange Online - authentication traffic will still be safely encrypted. - - - [4.11.55.2.1] - - This policy setting allows you to manage whether the Windows Remote Management - - (WinRM) service accepts Basic authentication from a remote client. - - The recommended state for this setting is: Disabled.' - resolution: '[4.11.55.1.1] + authentication traffic will still be safely encrypted.' + resolution: ' To establish the recommended configuration via configuration profiles, set the following @@ -2588,10 +2596,24 @@ spec: Administrative Templates\Windows Components\Windows Remote Management - (WinRM)\WinRM Client\Allow Basic authentication + (WinRM)\WinRM Client\Allow Basic authentication' +--- +apiVersion: v1 +kind: policy +spec: + platform: windows + name: CIS - Ensure Service 'Allow Basic authentication is set to Disabled' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service\AllowBasic' AND data = '0'; + purpose: Informational + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:allow-basic-authentication-is-disabled, cis_safeguard_ids:CIS4.11.55.2.1 + description: ' + This policy setting allows you to manage whether the Windows Remote Management + (WinRM) service accepts Basic authentication from a remote client. - [4.11.55.2.1] + The recommended state for this setting is: Disabled.' + + resolution: ' To establish the recommended configuration via configuration profiles, set the following @@ -2605,27 +2627,19 @@ apiVersion: v1 kind: policy spec: platform: windows - name: CIS - Ensure 'Allow unencrypted traffic' is set to 'Disabled' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service\AllowUnencryptedTraffic' AND data = '0'; + name: CIS - Ensure Client 'Allow unencrypted traffic' is set to 'Disabled' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WinRM\Client\AllowUnencryptedTraffic' AND data = '0'; purpose: Informational - tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:allow-unencrypted-traffic-is-disabled, cis_safeguard_ids:CIS4.11.55.1.2;CIS4.11.55.2.3 - description: '[4.11.55.1.2] + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:allow-unencrypted-traffic-is-disabled, cis_safeguard_ids:CIS4.11.55.1.2 + description: ' This policy setting allows you to manage whether the Windows Remote Management (WinRM) client sends and receives unencrypted messages over the network. - The recommended state for this setting is: Disabled. - - - [4.11.55.2.3] - - This policy setting allows you to manage whether the Windows Remote Management - - (WinRM) service sends and receives unencrypted messages over the network. - The recommended state for this setting is: Disabled.' - resolution: '[4.11.55.1.2] + + resolution: ' To establish the recommended configuration via configuration profiles, set the following @@ -2633,10 +2647,25 @@ spec: Administrative Templates\Windows Components\Windows Remote Management - (WinRM)\WinRM Client\Allow unencrypted traffic + (WinRM)\WinRM Client\Allow unencrypted traffic' +--- +apiVersion: v1 +kind: policy +spec: + platform: windows + name: CIS - Ensure Service 'Allow unencrypted traffic' is set to 'Disabled' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service\AllowUnencryptedTraffic' AND data = '0'; + purpose: Informational + tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:allow-unencrypted-traffic-is-disabled, cis_safeguard_ids:CIS4.11.55.2.3 + description: ' + This policy setting allows you to manage whether the Windows Remote Management - [4.11.55.2.3] + (WinRM) service sends and receives unencrypted messages over the network. + + The recommended state for this setting is: Disabled.' + + resolution: ' To establish the recommended configuration via configuration profiles, set the following @@ -5544,8 +5573,8 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''Enable Domain Network Firewall: Disable Inbound Notifications'' is set to ''True''' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall' AND data = '1'; + name: CIS - Ensure 'Enable Domain Network Firewall Disable Inbound Notifications' is set to 'True' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\Mdm\DomainProfile\DisableNotifications' AND data = '1'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:enable-domain-network-firewall-disable-inbound-notifications-is-true, cis_safeguard_ids:CIS38.3 description: 'Select this option to have Windows Firewall with Advanced Security display notifications @@ -5571,7 +5600,7 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''Enable Domain Network Firewall: Enable Log Dropped Packets'' is set to ''Yes: Enable Logging Of Dropped Packets''' + name: CIS - Ensure 'Enable Domain Network Firewall Enable Log Dropped Packets' is set to 'Yes'. Enable Logging Of Dropped Packets query: SELECT 1 FROM mdm_bridge WHERE mdm_command_input = '1./Device/Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableLogDroppedPackets' AND mdm_command_output = 'true'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:enable-domain-network-firewall-enable-log-dropped-packets-is-yes-enable-logging-of-dropped-packets, cis_safeguard_ids:CIS38.4 @@ -5592,8 +5621,8 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''Enable Domain Network Firewall: Enable Log Success Connections'' is set to ''Enable Logging Of Successful Connections''' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall' AND data = '1'; + name: CIS - Ensure 'Enable Domain Network Firewall Enable Log Success Connections' is set to 'Enable Logging Of Successful Connections' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\Mdm\DomainProfile\Logging\LogSuccessfulConnections' AND data = '1'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:enable-domain-network-firewall-enable-log-success-connections-is-enable-logging-of-successful-connections, cis_safeguard_ids:CIS38.5 description: 'Use this option to log when Windows Firewall with Advanced Security allows an @@ -5701,8 +5730,8 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''Enable Private Network Firewall: Disable Inbound Notifications'' is set to ''True''' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall' AND data = '1'; + name: CIS - Ensure 'Enable Private Network Firewall Disable Inbound Notifications' is set to 'True' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\Mdm\StandardProfile\DisableNotifications' AND data = '1'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:enable-private-network-firewall-disable-inbound-notifications-is-true, cis_safeguard_ids:CIS38.10 description: 'Select this option to have Windows Firewall with Advanced Security display notifications @@ -5728,8 +5757,8 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''Enable Private Network Firewall: Enable Log Success Connections'' is set to ''Enable Logging Of Successful Connections''' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall' AND data = '1'; + name: CIS - Ensure 'Enable Private Network Firewall Enable Log Success Connections' is set to 'Enable Logging Of Successful Connections' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\Mdm\StandardProfile\Logging\LogSuccessfulConnections' AND data = '1'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:enable-private-network-firewall-enable-log-success-connections-is-enable-logging-of-successful-connections, cis_safeguard_ids:CIS38.11 description: 'Use this option to log when Windows Firewall with Advanced Security allows an @@ -5906,8 +5935,8 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''Enable Public Network Firewall: Disable Inbound Notifications'' is set to ''True''' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall' AND data = '1'; + name: CIS - Ensure 'Enable Public Network Firewall Disable Inbound Notifications' is set to 'True' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\Mdm\PublicProfile\DisableNotifications' AND data = '1'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:enable-public-network-firewall-disable-inbound-notifications-is-true, cis_safeguard_ids:CIS38.19 description: 'Select this option to have Windows Firewall with Advanced Security display notifications @@ -5925,7 +5954,7 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''Enable Public Network Firewall: Enable Log Dropped Packets'' is set to ''Yes: Enable Logging Of Dropped Packets''' + name: CIS - Ensure 'Enable Public Network Firewall Enable Log Dropped Packets' is set to 'Enable Logging Of Dropped Packets' query: SELECT 1 FROM mdm_bridge WHERE mdm_command_input = '1./Device/Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableLogDroppedPackets' AND mdm_command_output = 'true'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:enable-public-network-firewall-enable-log-dropped-packets-is-yes-enable-logging-of-dropped-packets, cis_safeguard_ids:CIS38.20 @@ -5946,8 +5975,8 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''Enable Public Network Firewall: Enable Log Success Connections'' is set to ''Enable Logging Of Successful Connections''' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall' AND data = '1'; + name: CIS - Ensure 'Enable Public Network Firewall Enable Log Success Connections' is set to 'Enable Logging Of Successful Connections' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\Mdm\PublicProfile\Logging\LogSuccessfulConnections' AND data = '1'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:enable-public-network-firewall-enable-log-success-connections-is-enable-logging-of-successful-connections, cis_safeguard_ids:CIS38.21 description: 'Use this option to log when Windows Firewall with Advanced Security allows an @@ -6837,8 +6866,8 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''User Account Control: Use Admin Approval Mode'' is set to ''Enabled''' - query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA' AND data = '1'; + name: CIS - Ensure 'User Account Control Use Admin Approval Mode' is set to 'Enabled' + query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken AND data = '1'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:security, requirement:standard, critical:false, control:user-account-control-use-admin-approval-mode-is-enabled, cis_safeguard_ids:CIS49.32 description: 'This policy setting controls the behavior of Admin Approval Mode for the built-in @@ -6877,7 +6906,7 @@ apiVersion: v1 kind: policy spec: platform: windows - name: 'CIS - Ensure ''User Account Control: Run all administrators in Admin Approval Mode'' is set to ''Enabled''' + name: CIS - Ensure 'User Account Control Run all administrators in Admin Approval Mode' is set to 'Enabled' query: SELECT 1 FROM registry WHERE path = 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA' AND data = '1'; purpose: Informational tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:configuration, requirement:standard, critical:false, control:user-account-control-run-all-administrators-in-admin-approval-mode-is-enabled, cis_safeguard_ids:CIS49.34 @@ -10599,28 +10628,6 @@ spec: --- apiVersion: v1 kind: policy -spec: - name: 'CIS - Ensure ''Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup'' is set to ''IEEE 1394 device setup classes''' - platform: windows - description: 'Policy checks the configuration for: CIS - Ensure ''Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup'' is set to ''IEEE 1394 device setup classes''. Expected state per CIS Intune benchmark: IEEE 1394 device setup classes.' - resolution: "Automatic method: To establish the recommended configuration via configuration profiles, set the following \nSettings Catalog path to Enabled, and add {d48179be-ec20-11d1-b6b8-\n00c04fa372a7}, {7ebefbc0-3200-11d2-b4c2-00a0C9697d07}, {c06ff265-ae09-\n48f0-812c-16753d7cba83}, and {6bdd1fc1-810f-11d0-bec7-08002be2092f} to the \ndevice setup classes list. \nAdministrative Templates\\System\\Device Installation\\Device Installation \nRestrictions\\Prevent installation of devices using drivers that match these \ndevice setup classes" - query: SELECT 1 WHERE EXISTS (SELECT 1 FROM mdm_bridge WHERE mdm_command_input = '1./Device/Vendor/MSFT/Policy/Result/DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses' AND mdm_command_output LIKE '%6bdd1fc1-810f-11d0-bec7-08002be2092f%') OR EXISTS (SELECT 1 FROM registry WHERE path LIKE 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DeviceInstall\Restrictions\DenyDeviceClasses\%' AND data LIKE '%d48179be-ec20-11d1-b6b8-00c04fa372a7%'); - tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:security, requirement:standard, critical:false, control:prevent-installation-of-devices-using-drivers-that - purpose: Enforcement ---- -apiVersion: v1 -kind: policy -spec: - name: 'CIS - Ensure ''Windows Firewall: Public: Settings: Apply local connection security rules'' is set to ''No''' - platform: windows - description: 'Policy checks the configuration for: CIS - Ensure ''Windows Firewall: Public: Settings: Apply local connection security rules'' is set to ''No''. Expected state per CIS Intune benchmark: No.' - resolution: "Automatic method: To establish the recommended configuration via configuration profiles, set the following \nSettings Catalog path to True (recommended): \nFirewall\\Enable Public Network Firewall" - query: SELECT 1 FROM mdm_bridge WHERE mdm_command_input = '1./Vendor/MSFT/Firewall/MdmStore/PublicProfile/AllowLocalIpsecPolicyMerge' AND mdm_command_output = 'false'; - tags: framework:CISv8.1, benchmark:win11, level:1, platform:windows, category:security, requirement:standard, critical:false, control:windows-firewall-public-settings-apply-local-conne - purpose: Enforcement ---- -apiVersion: v1 -kind: policy spec: platform: windows name: 'CIS - Configure ''Accounts: Rename administrator account'''