| IT-PO-SEC-C-Server Hardening | |
| Data collected on: 2-9-2025 09:32:29 | |
| Domain | emea.tpg.ads |
| Owner | S-1-5-21-513466819-3096973226-347852806-255910 |
| Created | 3-10-2019 14:15:18 |
| Modified | 17-10-2024 13:15:36 |
| User Revisions | 0 (AD), 0 (SYSVOL) |
| Computer Revisions | 156 (AD), 156 (SYSVOL) |
| Unique ID | {c116ec47-a7e4-4e80-9bf3-b4c3a404543e} |
| GPO Status | Enabled |
| Location | Enforced | Link Status | Path |
|---|---|---|---|
| Servers | No | Enabled | emea.tpg.ads/IT/Systems/Servers |
| Name |
|---|
| NT AUTHORITY\Authenticated Users |
| Name | Allowed Permissions | Inherited |
|---|---|---|
| EMEA\Domain Admins | Edit settings, delete, modify security | No |
| EMEA\IT-G-ORG-OU Admins | Edit settings, delete, modify security | No |
| EMEA\IT-L-SEC-Delegation Full Access | Edit settings, delete, modify security | No |
| NT AUTHORITY\Authenticated Users | Read (from Security Filtering) | No |
| NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS | Read | No |
| NT AUTHORITY\SYSTEM | Edit settings, delete, modify security | No |
| ROOT\Enterprise Admins | Edit settings, delete, modify security | No |
| S-1-5-21-513466819-3096973226-347852806-255910 | Edit settings, delete, modify security | No |
| Policy | Setting |
|---|---|
| Access this computer from the network | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, NT AUTHORITY\Authenticated Users, BUILTIN\Administrators |
| Adjust memory quotas for a process | NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Allow log on locally | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Backup Operators, BUILTIN\Administrators |
| Change the system time | NT AUTHORITY\LOCAL SERVICE, EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Create a pagefile | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Force shutdown from a remote system | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Generate security audits | NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE |
| Increase scheduling priority | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Load and unload device drivers | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Lock pages in memory | |
| Manage auditing and security log | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Modify firmware environment values | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Perform volume maintenance tasks | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Profile single process | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Profile system performance | WdiServiceHost, NT Service, EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Remove computer from docking station | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Restore files and directories | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Backup Operators, BUILTIN\Administrators |
| Shut down the system | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Take ownership of files or other objects | EMEA\IT-L-SEC-Delegation Local Administration Rights Tier1, BUILTIN\Administrators |
| Policy | Setting |
|---|---|
| Accounts: Limit local account use of blank passwords to console logon only | Enabled |
| Policy | Setting |
|---|---|
| Devices: Allowed to format and eject removable media | Administrators |
| Devices: Prevent users from installing printer drivers | Enabled |
| Policy | Setting |
|---|---|
| Domain controller: LDAP server signing requirements | Require signing |
| Policy | Setting |
|---|---|
| Domain member: Digitally encrypt or sign secure channel data (always) | Enabled |
| Domain member: Digitally encrypt secure channel data (when possible) | Enabled |
| Domain member: Digitally sign secure channel data (when possible) | Enabled |
| Domain member: Disable machine account password changes | Disabled |
| Domain member: Require strong (Windows 2000 or later) session key | Enabled |
| Policy | Setting |
|---|---|
| Interactive logon: Do not require CTRL+ALT+DEL | Disabled |
| Interactive logon: Don't display last signed-in | Enabled |
| Interactive logon: Number of previous logons to cache (in case domain controller is not available) | 0 logons |
| Interactive logon: Require Domain Controller authentication to unlock workstation | Enabled |
| Policy | Setting |
|---|---|
| Microsoft network client: Digitally sign communications (always) | Enabled |
| Microsoft network client: Digitally sign communications (if server agrees) | Enabled |
| Policy | Setting |
|---|---|
| Microsoft network server: Digitally sign communications (always) | Enabled |
| Microsoft network server: Digitally sign communications (if client agrees) | Enabled |
| Policy | Setting |
|---|---|
| Network access: Allow anonymous SID/Name translation | Disabled |
| Network access: Do not allow anonymous enumeration of SAM accounts | Enabled |
| Network access: Do not allow anonymous enumeration of SAM accounts and shares | Enabled |
| Network access: Do not allow storage of passwords and credentials for network authentication | Enabled |
| Network access: Let Everyone permissions apply to anonymous users | Disabled |
| Policy | Setting | ||||
|---|---|---|---|---|---|
| Network security: Do not store LAN Manager hash value on next password change | Enabled | ||||
| Network security: LAN Manager authentication level | Send NTLMv2 response only. Refuse LM & NTLM | ||||
| Network security: LDAP client signing requirements | Require signing | ||||
| Network security: Minimum session security for NTLM SSP based (including secure RPC) servers | Enabled | ||||
| |||||
| Policy | Setting |
|---|---|
| System cryptography: Force strong key protection for user keys stored on the computer | User is prompted when the key is first used |
| Policy | Setting | Comment | ||||
|---|---|---|---|---|---|---|
| Require use of specific security layer for remote (RDP) connections | Enabled | |||||
| ||||||
| Policy | Setting | Comment | ||||
| Server authentication certificate template | Enabled | |||||
| ||||||
| Policy | Setting | Comment | ||
|---|---|---|---|---|
| Set time limit for active but idle Remote Desktop Services sessions | Enabled | |||
| ||||