Group 1 CIS Compliance 4lojg4
Group 1 CIS Compliance 4lojg4
GeeksForLess
Report generated by Nessus™   Fri, 31 Jul 2020 10:24:59 UTC
                                                                   TABLE OF CONTENTS
• 10.50.50.211.........................................................................................................................................................5
• 10.200.0.70...........................................................................................................................................................6
            0                      0                      0        0      2
        CRITICAL                  HIGH                 MEDIUM      LOW   INFO
Vulnerabilities Total: 2
10.50.50.203                                                                          4
                                                  10.50.50.211
            0                      0                      0        0      2
        CRITICAL                  HIGH                 MEDIUM      LOW   INFO
Vulnerabilities Total: 2
10.50.50.211                                                                          5
                                                   10.200.0.70
              0                    0                      0        0      2
        CRITICAL                  HIGH                 MEDIUM      LOW   INFO
Vulnerabilities Total: 2
10.200.0.70                                                                           6
Compliance Executive Summary
                                                 Audit Checks
 SEVERITY      NAME
PASSED 1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'
PASSED 1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'
PASSED 1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)'
PASSED 1.1.4 Ensure 'Minimum password length' is set to '14 or more character(s)'
PASSED 1.1.5 Ensure 'Password must meet complexity requirements' is set to 'Enabled'
PASSED 1.1.6 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'
PASSED 1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'
PASSED 1.2.2 Ensure 'Account lockout threshold' is set to '10 or fewer invalid logon attempt(s), but not 0'
PASSED 1.2.3 Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)'
PASSED 2.2.1 Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'
   PASSED      2.2.2 Ensure 'Access this computer from the network' is set to 'Administrators, Remote Desktop
               Users'
PASSED 2.2.3 Ensure 'Act as part of the operating system' is set to 'No One'
   PASSED      2.2.4 Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE,
               NETWORK SERVICE'
   PASSED      2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote
               Desktop Users'
PASSED 2.2.8 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'
PASSED 2.2.9 Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE, Users'
   PASSED      2.2.12 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK
               SERVICE, SERVICE'
Audit Checks                                                                                                          8
   PASSED      2.2.13 Ensure 'Create permanent shared objects' is set to 'No One'
PASSED 2.2.16 Ensure 'Deny access to this computer from the network' to include 'Guests, Local account'
PASSED 2.2.20 Ensure 'Deny log on through Remote Desktop Services' to include 'Guests, Local account'
PASSED 2.2.21 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One'
PASSED 2.2.22 Ensure 'Force shutdown from a remote system' is set to 'Administrators'
PASSED 2.2.23 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'
   PASSED      2.2.24 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL
               SERVICE, NETWORK SERVICE, SERVICE'
   PASSED      2.2.25 Ensure 'Increase scheduling priority' is set to 'Administrators, Window Manager\Window
               Manager Group'
PASSED 2.2.26 Ensure 'Load and unload device drivers' is set to 'Administrators'
PASSED 2.2.30 Ensure 'Manage auditing and security log' is set to 'Administrators'
PASSED 2.2.36 Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'
PASSED 2.2.38 Ensure 'Shut down the system' is set to 'Administrators, Users'
Audit Checks                                                                                                       9
   PASSED      2.2.39 Ensure 'Take ownership of files or other objects' is set to 'Administrators'
   PASSED      2.3.1.2 Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with
               Microsoft accounts'
   PASSED      2.3.1.4 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set
               to 'Enabled'
   PASSED      2.3.2.1 Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override
               audit policy category settings' is set to 'Enabled'
   PASSED      2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to
               'Disabled'
   PASSED      2.3.4.1 Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators and
               Interactive Users'
   PASSED      2.3.6.1 Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to
               'Enabled'
   PASSED      2.3.6.2 Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to
               'Enabled'
   PASSED      2.3.6.3 Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to
               'Enabled'
PASSED 2.3.6.4 Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled'
   PASSED      2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer
               days, but not 0'
   PASSED      2.3.6.6 Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to
               'Enabled'
PASSED 2.3.7.1 Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled'
PASSED 2.3.7.2 Ensure 'Interactive logon: Don't display last signed-in' is set to 'Enabled'
   PASSED      2.3.7.4 Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not
               0'
Audit Checks                                                                                                         10
   FAILED      2.3.7.5 Configure 'Interactive logon: Message text for users attempting to log on'
FAILED 2.3.7.6 Configure 'Interactive logon: Message title for users attempting to log on'
   PASSED      2.3.7.8 Ensure 'Interactive logon: Prompt user to change password before expiration' is set to
               'between 5 and 14 days'
   PASSED      2.3.7.9 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or
               higher
PASSED 2.3.8.1 Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled'
   PASSED      2.3.8.2 Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to
               'Enabled'
   PASSED      2.3.8.3 Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is
               set to 'Disabled'
   PASSED      2.3.9.1 Ensure 'Microsoft network server: Amount of idle time required before suspending session'
               is set to '15 or fewer minute(s)'
PASSED 2.3.9.2 Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'
   PASSED      2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to
               'Enabled'
   PASSED      2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to
               'Enabled'
   PASSED      2.3.9.5 Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept
               if provided by client' or higher
PASSED 2.3.10.1 Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled'
   PASSED      2.3.10.2 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to
               'Enabled'
   PASSED      2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and
               shares' is set to 'Enabled'
   PASSED      2.3.10.4 Ensure 'Network access: Do not allow storage of passwords and credentials for network
               authentication' is set to 'Enabled'
   PASSED      2.3.10.5 Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to
               'Disabled'
   PASSED      2.3.10.6 Ensure 'Network access: Named Pipes that can be accessed anonymously' is set to
               'None'
Audit Checks                                                                                                           11
   PASSED      2.3.10.7 Ensure 'Network access: Remotely accessible registry paths'
PASSED 2.3.10.8 Ensure 'Network access: Remotely accessible registry paths and sub-paths'
   PASSED      2.3.10.9 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set
               to 'Enabled'
   PASSED      2.3.10.10 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to
               'Administrators: Remote Access: Allow'
PASSED 2.3.10.11 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None'
   PASSED      2.3.10.12 Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic
               - local users authenticate as themselves'
   PASSED      2.3.11.1 Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to
               'Enabled'
PASSED 2.3.11.2 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'
   PASSED      2.3.11.3 Ensure 'Network Security: Allow PKU2U authentication requests to this computer to use
               online identities' is set to 'Disabled'
   PASSED      2.3.11.4 Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to
               'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'
   PASSED      2.3.11.5 Ensure 'Network security: Do not store LAN Manager hash value on next password
               change' is set to 'Enabled'
PASSED 2.3.11.6 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'
   PASSED      2.3.11.7 Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2
               response only. Refuse LM & NTLM'
   PASSED      2.3.11.8 Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or
               higher
   PASSED      2.3.11.9 Ensure 'Network security: Minimum session security for NTLM SSP based (including
               secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
   PASSED      2.3.11.10 Ensure 'Network security: Minimum session security for NTLM SSP based (including
               secure RPC) servers' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
   PASSED      2.3.15.1 Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to
               'Enabled'
   PASSED      2.3.15.2 Ensure 'System objects: Strengthen default permissions of internal system objects (e.g.
               Symbolic Links)' is set to 'Enabled'
Audit Checks                                                                                                       12
   PASSED      2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator
               account' is set to 'Enabled'
   PASSED      2.3.17.2 Ensure 'User Account Control: Behavior of the elevation prompt for administrators in
               Admin Approval Mode' is set to 'Prompt for consent on the secure desktop'
   PASSED      2.3.17.3 Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set
               to 'Automatically deny elevation requests'
   PASSED      2.3.17.4 Ensure 'User Account Control: Detect application installations and prompt for elevation' is
               set to 'Enabled'
   PASSED      2.3.17.5 Ensure 'User Account Control: Only elevate UIAccess applications that are installed in
               secure locations' is set to 'Enabled'
   PASSED      2.3.17.6 Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to
               'Enabled'
   PASSED      2.3.17.7 Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation'
               is set to 'Enabled'
   PASSED      2.3.17.8 Ensure 'User Account Control: Virtualize file and registry write failures to per-user
               locations' is set to 'Enabled'
PASSED 5.3 Ensure 'Computer Browser (Browser)' is set to 'Disabled' or 'Not Installed'
PASSED 5.6 Ensure 'IIS Admin Service (IISADMIN)' is set to 'Disabled' or 'Not Installed'
PASSED 5.8 Ensure 'Internet Connection Sharing (ICS) (SharedAccess)' is set to 'Disabled'
PASSED 5.11 Ensure 'Microsoft FTP Service (FTPSVC)' is set to 'Disabled' or 'Not Installed'
PASSED 5.14 Ensure 'OpenSSH SSH Server (sshd)' is set to 'Disabled' or 'Not Installed'
PASSED 5.24 Ensure 'Remote Procedure Call (RPC) Locator (RpcLocator)' is set to 'Disabled'
PASSED 5.26 Ensure 'Routing and Remote Access (RemoteAccess)' is set to 'Disabled'
PASSED 5.28 Ensure 'Simple TCP/IP Services (simptcp)' is set to 'Disabled' or 'Not Installed'
PASSED 5.32 Ensure 'Web Management Service (WMSvc)' is set to 'Disabled' or 'Not Installed'
Audit Checks                                                                                                      13
   PASSED      5.35 Ensure 'Windows Media Player Network Sharing Service (WMPNetworkSvc)' is set to
               'Disabled' or 'Not Installed'
PASSED 5.36 Ensure 'Windows Mobile Hotspot Service (icssvc)' is set to 'Disabled'
PASSED 5.40 Ensure 'World Wide Web Publishing Service (W3SVC)' is set to 'Disabled' or 'Not Installed'
PASSED 5.41 Ensure 'Xbox Accessory Management Service (XboxGipSvc)' is set to 'Disabled'
PASSED 5.42 Ensure 'Xbox Live Auth Manager (XblAuthManager)' is set to 'Disabled'
PASSED 5.43 Ensure 'Xbox Live Game Save (XblGameSave)' is set to 'Disabled'
PASSED 5.44 Ensure 'Xbox Live Networking Service (XboxNetApiSvc)' is set to 'Disabled'
PASSED 9.1.1 Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)'
PASSED 9.1.2 Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)'
PASSED 9.1.3 Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)'
PASSED 9.1.4 Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No'
   PASSED      9.1.5 Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%
               \System32\logfiles\firewall\domainfw.log'
PASSED 9.1.6 Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater'
PASSED 9.1.7 Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes'
PASSED 9.1.8 Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes'
PASSED 9.2.1 Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)'
PASSED 9.2.2 Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)'
PASSED 9.2.3 Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)'
PASSED 9.2.4 Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No'
   PASSED      9.2.5 Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SystemRoot%
               \System32\logfiles\firewall\privatefw.log'
PASSED 9.2.6 Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater'
PASSED 9.2.7 Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes'
PASSED 9.2.8 Ensure 'Windows Firewall: Private: Logging: Log successful connections' is set to 'Yes'
PASSED 9.3.1 Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)'
Audit Checks                                                                                                         14
   PASSED      9.3.2 Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)'
PASSED 9.3.3 Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)'
PASSED 9.3.4 Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'No'
PASSED 9.3.5 Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No'
   PASSED      9.3.6 Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to
               'No'
   PASSED      9.3.7 Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%
               \System32\logfiles\firewall\publicfw.log'
PASSED 9.3.8 Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater'
PASSED 9.3.9 Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes'
PASSED 9.3.10 Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes'
WARNING 17.1.1 Ensure 'Audit Credential Validation' is set to 'Success and Failure'
WARNING 17.2.1 Ensure 'Audit Application Group Management' is set to 'Success and Failure'
WARNING 17.2.2 Ensure 'Audit Security Group Management' is set to include 'Success'
WARNING 17.2.3 Ensure 'Audit User Account Management' is set to 'Success and Failure'
WARNING 17.5.5 Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'
WARNING 17.6.1 Ensure 'Audit Detailed File Share' is set to include 'Failure'
WARNING 17.6.2 Ensure 'Audit File Share' is set to 'Success and Failure'
WARNING 17.6.3 Ensure 'Audit Other Object Access Events' is set to 'Success and Failure'
Audit Checks                                                                                                        15
  WARNING      17.6.4 Ensure 'Audit Removable Storage' is set to 'Success and Failure'
WARNING 17.7.1 Ensure 'Audit Audit Policy Change' is set to include 'Success'
WARNING 17.7.2 Ensure 'Audit Authentication Policy Change' is set to include 'Success'
WARNING 17.7.3 Ensure 'Audit Authorization Policy Change' is set to include 'Success'
WARNING 17.7.4 Ensure 'Audit MPSSVC Rule-Level Policy Change' is set to 'Success and Failure'
WARNING 17.7.5 Ensure 'Audit Other Policy Change Events' is set to include 'Failure'
WARNING 17.8.1 Ensure 'Audit Sensitive Privilege Use' is set to 'Success and Failure'
WARNING 17.9.1 Ensure 'Audit IPsec Driver' is set to 'Success and Failure'
WARNING 17.9.2 Ensure 'Audit Other System Events' is set to 'Success and Failure'
WARNING 17.9.3 Ensure 'Audit Security State Change' is set to include 'Success'
WARNING 17.9.4 Ensure 'Audit Security System Extension' is set to include 'Success'
WARNING 17.9.5 Ensure 'Audit System Integrity' is set to 'Success and Failure'
PASSED 18.1.1.1 Ensure 'Prevent enabling lock screen camera' is set to 'Enabled'
PASSED 18.1.1.2 Ensure 'Prevent enabling lock screen slide show' is set to 'Enabled'
PASSED 18.1.2.2 Ensure 'Allow users to enable online speech recognition services' is set to 'Disabled'
FAILED 18.2.1 Ensure LAPS AdmPwd GPO Extension / CSE is installed - DllName
   FAILED      18.2.2 Ensure 'Do not allow password expiration time longer than required by policy' is set to
               'Enabled'
FAILED 18.2.3 Ensure 'Enable Local Admin Password Management' is set to 'Enabled'
   FAILED      18.2.4 Ensure 'Password Settings: Password Complexity' is set to 'Enabled: Large letters + small
               letters + numbers + special characters'
FAILED 18.2.5 Ensure 'Password Settings: Password Length' is set to 'Enabled: 15 or more'
FAILED 18.2.6 Ensure 'Password Settings: Password Age (Days)' is set to 'Enabled: 30 or fewer'
PASSED 18.3.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled'
PASSED 18.3.2 Ensure 'Configure SMB v1 client driver' is set to 'Enabled: Disable driver (recommended)'
Audit Checks                                                                                                      16
   PASSED      18.3.4 Ensure 'Enable Structured Exception Handling Overwrite Protection (SEHOP)' is set to
               'Enabled'
PASSED 18.3.5 Ensure 'NetBT NodeType configuration' is set to 'Enabled: P-node (recommended)'
   PASSED      18.4.1 Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to
               'Disabled'
   PASSED      18.4.2 Ensure 'MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects
               against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely
               disabled'
   PASSED      18.4.3 Ensure 'MSS: (DisableIPSourceRouting) IP source routing protection level (protects against
               packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled'
   PASSED      18.4.5 Ensure 'MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated
               routes' is set to 'Disabled'
   PASSED      18.4.7 Ensure 'MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name
               release requests except from WINS servers' is set to 'Enabled'
   PASSED      18.4.9 Ensure 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)' is set
               to 'Enabled'
   PASSED      18.4.10 Ensure 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver
               grace period expires (0 recommended)' is set to 'Enabled: 5 or fewer seconds'
   PASSED      18.4.13 Ensure 'MSS: (WarningLevel) Percentage threshold for the security event log at which the
               system will generate a warning' is set to 'Enabled: 90% or less'
PASSED 18.5.4.1 Ensure 'Turn off multicast name resolution' is set to 'Enabled'
   PASSED      18.5.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain
               network' is set to 'Enabled'
   PASSED      18.5.11.3 Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set
               to 'Enabled'
   PASSED      18.5.11.4 Ensure 'Require domain users to elevate when setting a network's location' is set to
               'Enabled'
   PASSED      18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication'
               and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGON
Audit Checks                                                                                                    17
   PASSED      18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication'
               and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOL
   PASSED      18.5.21.1 Ensure 'Minimize the number of simultaneous connections to the Internet or a Windows
               Domain' is set to 'Enabled: 3 = Prevent Wi-Fi when on Ethernet'
   PASSED      18.5.21.2 Ensure 'Prohibit connection to non-domain networks when connected to domain
               authenticated network' is set to 'Enabled'
   PASSED      18.5.23.2.1 Ensure 'Allow Windows to automatically connect to suggested open hotspots, to
               networks shared by contacts, and to hotspots offering paid services' is set to 'Disabled'
PASSED 18.8.3.1 Ensure 'Include command line in process creation events' is set to 'Disabled'
PASSED 18.8.4.1 Ensure 'Encryption Oracle Remediation' is set to 'Enabled: Force Updated Clients'
PASSED 18.8.4.2 Ensure 'Remote host allows delegation of non-exportable credentials' is set to 'Enabled'
   PASSED      18.8.14.1 Ensure 'Boot-Start Driver Initialization Policy' is set to 'Enabled: Good, unknown and bad
               but critical'
   PASSED      18.8.21.2 Ensure 'Configure registry policy processing: Do not apply during periodic background
               processing' is set to 'Enabled: FALSE'
   PASSED      18.8.21.3 Ensure 'Configure registry policy processing: Process even if the Group Policy objects
               have not changed' is set to 'Enabled: TRUE'
PASSED 18.8.21.5 Ensure 'Turn off background refresh of Group Policy' is set to 'Disabled'
PASSED 18.8.22.1.2 Ensure 'Turn off downloading of print drivers over HTTP' is set to 'Enabled'
   PASSED      18.8.22.1.6 Ensure 'Turn off Internet download for Web publishing and online ordering wizards' is
               set to 'Enabled'
PASSED 18.8.28.1 Ensure 'Block user from showing account details on sign-in' is set to 'Enabled'
PASSED 18.8.28.2 Ensure 'Do not display network selection UI' is set to 'Enabled'
   PASSED      18.8.28.3 Ensure 'Do not enumerate connected users on domain-joined computers' is set to
               'Enabled'
PASSED 18.8.28.4 Ensure 'Enumerate local users on domain-joined computers' is set to 'Disabled'
PASSED 18.8.28.5 Ensure 'Turn off app notifications on the lock screen' is set to 'Enabled'
PASSED 18.8.28.6 Ensure 'Turn off picture password sign-in' is set to 'Enabled'
Audit Checks                                                                                                       18
   PASSED      18.8.28.7 Ensure 'Turn on convenience PIN sign-in' is set to 'Disabled'
   PASSED      18.8.34.6.1 Ensure 'Allow network connectivity during connected-standby (on battery)' is set to
               'Disabled'
   PASSED      18.8.34.6.2 Ensure 'Allow network connectivity during connected-standby (plugged in)' is set to
               'Disabled'
PASSED 18.8.34.6.5 Ensure 'Require a password when a computer wakes (on battery)' is set to 'Enabled'
PASSED 18.8.34.6.6 Ensure 'Require a password when a computer wakes (plugged in)' is set to 'Enabled'
PASSED 18.8.37.1 Ensure 'Enable RPC Endpoint Mapper Client Authentication' is set to 'Enabled'
PASSED 18.8.37.2 Ensure 'Restrict Unauthenticated RPC clients' is set to 'Enabled: Authenticated'
   PASSED      18.9.5.1 Ensure 'Let Windows apps activate with voice while the system is locked' is set to
               'Enabled: Force Deny'
PASSED 18.9.8.1 Ensure 'Disallow Autoplay for non-volume devices' is set to 'Enabled'
   PASSED      18.9.8.2 Ensure 'Set the default behavior for AutoRun' is set to 'Enabled: Do not execute any
               autorun commands'
PASSED 18.9.8.3 Ensure 'Turn off Autoplay' is set to 'Enabled: All drives'
PASSED 18.9.13.1 Ensure 'Turn off Microsoft consumer experiences' is set to 'Enabled'
PASSED 18.9.14.1 Ensure 'Require pin for pairing' is set to 'Enabled: First Time' OR 'Enabled: Always'
PASSED 18.9.15.1 Ensure 'Do not display the password reveal button' is set to 'Enabled'
PASSED 18.9.15.3 Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'
   PASSED      18.9.16.1 Ensure 'Allow Telemetry' is set to 'Enabled: 0 - Security [Enterprise Only]' or 'Enabled: 1 -
               Basic'
PASSED 18.9.16.3 Ensure 'Do not show feedback notifications' is set to 'Enabled'
Audit Checks                                                                                                        19
   PASSED      18.9.16.4 Ensure 'Toggle user control over Insider builds' is set to 'Disabled'
   PASSED      18.9.26.1.1 Ensure 'Application: Control Event Log behavior when the log file reaches its maximum
               size' is set to 'Disabled'
   PASSED      18.9.26.1.2 Ensure 'Application: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768
               or greater'
   PASSED      18.9.26.2.1 Ensure 'Security: Control Event Log behavior when the log file reaches its maximum
               size' is set to 'Disabled'
   PASSED      18.9.26.2.2 Ensure 'Security: Specify the maximum log file size (KB)' is set to 'Enabled: 196,608 or
               greater'
   PASSED      18.9.26.3.1 Ensure 'Setup: Control Event Log behavior when the log file reaches its maximum size'
               is set to 'Disabled'
   PASSED      18.9.26.3.2 Ensure 'Setup: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or
               greater'
   PASSED      18.9.26.4.1 Ensure 'System: Control Event Log behavior when the log file reaches its maximum
               size' is set to 'Disabled'
   PASSED      18.9.26.4.2 Ensure 'System: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or
               greater'
PASSED 18.9.30.2 Ensure 'Turn off Data Execution Prevention for Explorer' is set to 'Disabled'
PASSED 18.9.30.3 Ensure 'Turn off heap termination on corruption' is set to 'Disabled'
PASSED 18.9.30.4 Ensure 'Turn off shell protocol protected mode' is set to 'Disabled'
PASSED 18.9.35.1 Ensure 'Prevent the computer from joining a homegroup' is set to 'Enabled'
PASSED 18.9.44.1 Ensure 'Block all consumer Microsoft account user authentication' is set to 'Enabled'
PASSED 18.9.45.5 Ensure 'Configure cookies' is set to 'Enabled: Block only 3rd-party cookies' or higher
PASSED 18.9.45.9 Ensure 'Configure the Adobe Flash Click-to-Run setting' is set to 'Enabled'
PASSED 18.9.52.1 Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'
Audit Checks                                                                                                       20
   PASSED      18.9.59.2.2 Ensure 'Do not allow passwords to be saved' is set to 'Enabled'
PASSED 18.9.59.3.3.2 Ensure 'Do not allow drive redirection' is set to 'Enabled'
PASSED 18.9.59.3.9.1 Ensure 'Always prompt for password upon connection' is set to 'Enabled'
   PASSED      18.9.59.3.9.3 Ensure 'Require use of specific security layer for remote (RDP) connections' is set to
               'Enabled: SSL'
   PASSED      18.9.59.3.9.4 Ensure 'Require user authentication for remote connections by using Network Level
               Authentication' is set to 'Enabled'
PASSED 18.9.59.3.9.5 Ensure 'Set client connection encryption level' is set to 'Enabled: High Level'
PASSED 18.9.59.3.11.1 Ensure 'Do not delete temp folders upon exit' is set to 'Disabled'
PASSED 18.9.59.3.11.2 Ensure 'Do not use temporary folders per session' is set to 'Disabled'
PASSED 18.9.61.4 Ensure 'Allow Cortana above lock screen' is set to 'Disabled'
PASSED 18.9.61.6 Ensure 'Allow search and Cortana to use location' is set to 'Disabled'
PASSED 18.9.69.2 Ensure 'Only display the private store within the Microsoft Store' is set to 'Enabled'
PASSED 18.9.69.3 Ensure 'Turn off Automatic Download and Install of updates' is set to 'Disabled'
PASSED 18.9.69.4 Ensure 'Turn off the offer to update to the latest version of Windows' is set to 'Enabled'
   PASSED      18.9.77.3.1 Ensure 'Configure local setting override for reporting to Microsoft MAPS' is set to
               'Disabled'
PASSED 18.9.77.13.1.1 Ensure 'Configure Attack Surface Reduction rules' is set to 'Enabled'
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - 3b576869-a4ec-4529-8536-b80a7769e899
Audit Checks                                                                                                          21
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - 5beb7efe-fd9a-4556-801d-275e5ffc04cc
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - 26190899-1602-49e8-8b27-eb1d0a1ce869
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - be9ba2d9-53ea-4cdc-84e5-9b1eeee46550
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - d3e037e1-3eb8-44c8-a917-57927947596d
   PASSED      18.9.77.13.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
               is 'configured' - d4f940ab-401b-4efc-aadc-ad5f3c50688a
   PASSED      18.9.77.13.3.1 Ensure 'Prevent users and apps from accessing dangerous websites' is set to
               'Enabled: Block'
   PASSED      18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled:
               Block'
PASSED 18.9.77.15 Ensure 'Turn off Windows Defender AntiVirus' is set to 'Disabled'
   PASSED      18.9.80.1.1 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled: Warn and
               prevent bypass' - EnableSmartScreen
   PASSED      18.9.80.1.1 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled: Warn and
               prevent bypass' - ShellSmartScreenLevel
   PASSED      18.9.80.2.2 Ensure 'Prevent bypassing Windows Defender SmartScreen prompts for files' is set to
               'Enabled'
Audit Checks                                                                                                       22
   PASSED      18.9.80.2.3 Ensure 'Prevent bypassing Windows Defender SmartScreen prompts for sites' is set to
               'Enabled'
   PASSED      18.9.82.1 Ensure 'Enables or disables Windows Game Recording and Broadcasting' is set to
               'Disabled'
   PASSED      18.9.84.2 Ensure 'Allow Windows Ink Workspace' is set to 'Enabled: On, but disallow access above
               lock' OR 'Disabled' but not 'Enabled: On'
PASSED 18.9.85.1 Ensure 'Allow user control over installs' is set to 'Disabled'
PASSED 18.9.85.2 Ensure 'Always install with elevated privileges' is set to 'Disabled'
   PASSED      18.9.86.1 Ensure 'Sign-in and lock last interactive user automatically after a restart' is set to
               'Disabled'
PASSED 18.9.95.1 Ensure 'Turn on PowerShell Script Block Logging' is set to 'Disabled'
PASSED 18.9.97.2.4 Ensure 'Disallow WinRM from storing RunAs credentials' is set to 'Enabled'
PASSED 18.9.99.2.1 Ensure 'Prevent users from modifying settings' is set to 'Enabled'
PASSED 18.9.102.1.1 Ensure 'Manage preview builds' is set to 'Enabled: Disable preview builds'
   PASSED      18.9.102.1.2 Ensure 'Select when Preview Builds and Feature Updates are received' is set to
               'Enabled: Semi-Annual Channel, 180 or more days' - BranchReadinessLevel
   PASSED      18.9.102.1.2 Ensure 'Select when Preview Builds and Feature Updates are received' is set to
               'Enabled: Semi-Annual Channel, 180 or more days' - DeferFeatureUpdates
   PASSED      18.9.102.1.2 Ensure 'Select when Preview Builds and Feature Updates are received' is set to
               'Enabled: Semi-Annual Channel, 180 or more days' - DeferFeatureUpdatesPeriodInDays
   PASSED      18.9.102.1.3 Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days' -
               DeferQualityUpdates
Audit Checks                                                                                                       23
   PASSED      18.9.102.1.3 Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days' -
               DeferQualityUpdatesPeriodInDays
PASSED 18.9.102.3 Ensure 'Configure Automatic Updates: Scheduled install day' is set to '0 - Every day'
   PASSED      18.9.102.4 Ensure 'No auto-restart with logged on users for scheduled automatic updates
               installations' is set to 'Disabled'
PASSED 18.9.102.5 Ensure 'Remove access to Pause updates feature' is set to 'Enabled'
   PASSED      19.1.3.2 Ensure 'Force specific screen saver: Screen saver executable name' is set to 'Enabled:
               scrnsave.scr'
PASSED 19.1.3.3 Ensure 'Password protect the screen saver' is set to 'Enabled'
PASSED 19.1.3.4 Ensure 'Screen saver timeout' is set to 'Enabled: 900 seconds or fewer, but not 0'
PASSED 19.5.1.1 Ensure 'Turn off toast notifications on the lock screen' is set to 'Enabled'
PASSED 19.7.4.1 Ensure 'Do not preserve zone information in file attachments' is set to 'Disabled'
PASSED 19.7.4.2 Ensure 'Notify antivirus programs when opening attachments' is set to 'Enabled'
PASSED 19.7.7.1 Ensure 'Configure Windows spotlight on lock screen' is set to Disabled'
PASSED 19.7.7.2 Ensure 'Do not suggest third-party content in Windows spotlight' is set to 'Enabled'
PASSED 19.7.26.1 Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled'
PASSED 19.7.41.1 Ensure 'Always install with elevated privileges' is set to 'Disabled'
Audit Checks 24