三叉戟

领域专家的成长记录

用户工具

站点工具


resources:os:windows_server_2022:baseline

差别

这里会显示出您选择的修订版和当前版本之间的差别。

到此差别页面的链接

两侧同时换到之前的修订记录前一修订版
后一修订版
前一修订版
resources:os:windows_server_2022:baseline [2024/11/19 19:43] jackiezresources:os:windows_server_2022:baseline [2024/11/19 22:12] (当前版本) jackiez
行 73: 行 73:
 2.2.49 Ensure 'Take ownership of files or other objects' is set to 'Administrators' 2.2.49 Ensure 'Take ownership of files or other objects' is set to 'Administrators'
 #2.3 Security Options #2.3 Security Options
-##2.3.1 Accounts+##2.3.1 Account 
 +2.3.1.1 Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts' 
 +2.3.1.2 Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only) 
 +2.3.1.3 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled' 
 +2.3.1.4 Configure 'Accounts: Rename administrator account' 
 +2.3.1.5 Configure 'Accounts: Rename guest account' 
 +s
 ##2.3.2 Audit ##2.3.2 Audit
 +2.3.2.1 Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'
 +2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'
 ##2.3.3 DCOM ##2.3.3 DCOM
 +NA
 ##2.3.4 Devices ##2.3.4 Devices
 +2.3.4.1 Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled'
 ##2.3.5 Domain controller ##2.3.5 Domain controller
 +2.3.5.1 Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC only)
 +2.3.5.2 Ensure 'Domain controller: Allow vulnerable Netlogon secure channel connections' is set to 'Not Configured' (DC Only)
 +2.3.5.3 Ensure 'Domain controller: LDAP server channel binding token requirements' is set to 'Always' (DC Only)
 +2.3.5.4 Ensure 'Domain controller: LDAP server signing requirements' is set to 'Require signing' (DC only)
 +2.3.5.5 Ensure 'Domain controller: Refuse machine account password changes' is set to 'Disabled' (DC only)
 ##2.3.6 Domain member ##2.3.6 Domain member
 +2.3.6.1 Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'
 +2.3.6.2 Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'
 +2.3.6.3 Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled'
 +2.3.6.4 Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled'
 +2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0'
 +2.3.6.6 Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled'
 ##2.3.7 Interactive logon ##2.3.7 Interactive logon
 +2.3.7.1 Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled'
 +2.3.7.2 Ensure 'Interactive logon: Don't display last signed-in' is set to 'Enabled'
 +2.3.7.3 Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not 0'
 +2.3.7.4 Configure 'Interactive logon: Message text for users attempting to log on'
 +2.3.7.5 Configure 'Interactive logon: Message title for users attempting to log on'
 +2.3.7.6 (L2) Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to '4 or fewer logon(s)' (MS only)
 +2.3.7.7 Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days'
 +2.3.7.8 Ensure 'Interactive logon: Require Domain Controller Authentication to unlock workstation' is set to 'Enabled' (MS only)
 +2.3.7.9 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher
 ##2.3.8 Microsoft network client ##2.3.8 Microsoft network client
 +2.3.8.1 Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled'
 +2.3.8.2 Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled'
 +2.3.8.3 Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled'
 ##2.3.9 Microsoft network server ##2.3.9 Microsoft network server
 +2.3.9.1 Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)'
 +2.3.9.2 Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'
 +2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'
 +2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'
 +2.3.9.5 Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or higher (MS only)
 ##2.3.10 Network access ##2.3.10 Network access
 +2.3.10.1 Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled'
 +2.3.10.2 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (MS only)
 +2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (MS only)
 +2.3.10.4 Ensure 'Network access: Do not allow storage of passwords and credentials for network authentication' is set to 'Enabled'
 +2.3.10.5 Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled'
 +2.3.10.6 Configure 'Network access: Named Pipes that can be accessed anonymously' (DC only)
 +2.3.10.7 Configure 'Network access: Named Pipes that can be accessed anonymously' (MS only)
 +2.3.10.8 Configure 'Network access: Remotely accessible registry paths' is configured
 +2.3.10.9 Configure 'Network access: Remotely accessible registry paths and sub-paths' is configured
 +2.3.10.10 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'
 +2.3.10.11 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)
 +2.3.10.12 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None'
 +2.3.10.13 Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves'
 ##2.3.11 Network security ##2.3.11 Network security
 +2.3.11.1 Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to 'Enabled'
 +2.3.11.2 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'
 +2.3.11.3 Ensure 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' is set to 'Disabled'
 +2.3.11.4 Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'
 +2.3.11.5 Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled'
 +2.3.11.6 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'
 +2.3.11.7 Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM'
 +2.3.11.8 Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher
 +2.3.11.9 Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
 +2.3.11.10 Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to 'Require NTLMv2 session security, Require 128-bit encryption'
 +2.3.11.11 Ensure 'Network security: Restrict NTLM: Audit Incoming NTLM Traffic' is set to 'Enable auditing for all accounts'
 +2.3.11.12 Ensure 'Network security: Restrict NTLM: Audit NTLM authentication in this domain' is set to 'Enable all' (DC only)
 +2.3.11.13 Ensure 'Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers' is set to 'Audit all' or higher
 ##2.3.12 Recovery console ##2.3.12 Recovery console
 +NA
 ##2.3.13 Shutdown ##2.3.13 Shutdown
 +2.3.13.1 Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled'
 ##2.3.14 System cryptography ##2.3.14 System cryptography
 +NA
 ##2.3.15 System objects ##2.3.15 System objects
 +2.3.15.1 Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled'
 +2.3.15.2 Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled
 ##2.3.16 System settings ##2.3.16 System settings
 +NA
 ##2.3.17 User Account Control ##2.3.17 User Account Control
 +2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled'
 +2.3.17.2 Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higher
 +2.3.17.3 Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'
 +2.3.17.4 Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled'
 +2.3.17.5 Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled'
 +2.3.17.6 Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled'
 +2.3.17.7 Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled'
 +2.3.17.8 Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to 'Enabled'
 #3.Event Log #3.Event Log
 NA NA
行 104: 行 182:
 NA NA
 #9.Windows Defender Firewall with Advanced Security (formerly Windows Firewall with Advanced Security) #9.Windows Defender Firewall with Advanced Security (formerly Windows Firewall with Advanced Security)
 +##9.1 Domain Profile
 +9.1.1 Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)'
 +9.1.2 Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)'
 +9.1.3 Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No'
 +9.1.4 Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\domainfw.log'
 +9.1.5 Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater'
 +9.1.6 Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes'
 +9.1.7 Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes'
 +##9.2 Private Profile
 +9.2.1 Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)'
 +9.2.2 Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)'
 +9.2.3 Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No'
 +9.2.4 Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\privatefw.log'
 +9.2.5 Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater'
 +9.2.6 Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes'
 +9.2.7 Ensure 'Windows Firewall: Private: Logging: Log successful connections' is set to 'Yes'
 +##9.3 Public Profile
 +9.3.1 Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)'
 +9.3.2 Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)'
 +9.3.3 Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'No'
 +9.3.4 Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No'
 +9.3.5 Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No'
 +9.3.6 Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\publicfw.log'
 +9.3.7 Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater'
 +9.3.8 Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes'
 +9.3.9 Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes'
 #10.Network List Manager Policies #10.Network List Manager Policies
 NA NA
行 120: 行 224:
 #17.Advanced Audit Policy Configuration #17.Advanced Audit Policy Configuration
 ##17.1 Account Logon ##17.1 Account Logon
 +17.1.1 Ensure 'Audit Credential Validation' is set to 'Success and Failure'
 +17.1.2 Ensure 'Audit Kerberos Authentication Service' is set to 'Success and Failure' (DC Only)
 +17.1.3 Ensure 'Audit Kerberos Service Ticket Operations' is set to 'Success and Failure' (DC Only)
 ##17.2 Account Management ##17.2 Account Management
 +17.2.1 Ensure 'Audit Application Group Management' is set to 'Success and Failure'
 +17.2.2 Ensure 'Audit Computer Account Management' is set to include 'Success' (DC only)
 +17.2.3 Ensure 'Audit Distribution Group Management' is set to include 'Success' (DC only)
 +17.2.4 Ensure 'Audit Other Account Management Events' is set to include 'Success' (DC only)
 +17.2.5 Ensure 'Audit Security Group Management' is set to include 'Success'
 +17.2.6 Ensure 'Audit User Account Management' is set to 'Success and Failure'
 ##17.3 Detailed Tracking ##17.3 Detailed Tracking
 +17.3.1 Ensure 'Audit PNP Activity' is set to include 'Success'
 +17.3.2 Ensure 'Audit Process Creation' is set to include 'Success'
 ##17.4 DS Access ##17.4 DS Access
 +17.4.1 Ensure 'Audit Directory Service Access' is set to include 'Failure' (DC only)
 +17.4.2 Ensure 'Audit Directory Service Changes' is set to include 'Success' (DC only)
 ##17.5 Logon/Logoff ##17.5 Logon/Logoff
 +17.5.1 Ensure 'Audit Account Lockout' is set to include 'Failure'
 +17.5.2 Ensure 'Audit Group Membership' is set to include 'Success'
 +17.5.3 Ensure 'Audit Logoff' is set to include 'Success'
 +17.5.4 Ensure 'Audit Logon' is set to 'Success and Failure'
 +17.5.5 Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'
 +17.5.6 Ensure 'Audit Special Logon' is set to include 'Success'
 ##17.6 Object Access ##17.6 Object Access
 +17.6.1 Ensure 'Audit Detailed File Share' is set to include 'Failure'
 +17.6.2 Ensure 'Audit File Share' is set to 'Success and Failure'
 +17.6.3 Ensure 'Audit Other Object Access Events' is set to 'Success and Failure'
 +17.6.4 Ensure 'Audit Removable Storage' is set to 'Success and Failure'
 ##17.7 Policy Change ##17.7 Policy Change
 +17.7.1 Ensure 'Audit Audit Policy Change' is set to include 'Success'
 +17.7.2 Ensure 'Audit Authentication Policy Change' is set to include 'Success'
 +17.7.3 Ensure 'Audit Authorization Policy Change' is set to include 'Success'
 +17.7.4 Ensure 'Audit MPSSVC Rule-Level Policy Change' is set to 'Success and Failure'
 +17.7.5 Ensure 'Audit Other Policy Change Events' is set to include 'Failure'
 ##17.8 Privilege Use ##17.8 Privilege Use
 +17.8.1 Ensure 'Audit Sensitive Privilege Use' is set to 'Success and Failure'
 ##17.9 System ##17.9 System
 +17.9.1 Ensure 'Audit IPsec Driver' is set to 'Success and Failure'
 +17.9.2 Ensure 'Audit Other System Events' is set to 'Success and Failure'
 +17.9.3 Ensure 'Audit Security State Change' is set to include 'Success'
 +17.9.4 Ensure 'Audit Security System Extension' is set to include 'Success'
 +17.9.5 Ensure 'Audit System Integrity' is set to 'Success and Failure'
 #18.Administrative Templates #18.Administrative Templates
 ##18.1 Control Panel ##18.1 Control Panel
 +###18.1.1 Personalization
 +18.1.1.1 Ensure 'Prevent enabling lock screen camera' is set to 'Enabled'
 +18.1.1.2 Ensure 'Prevent enabling lock screen slide show' is set to 'Enabled'
 +###18.1.2 Regional and Language Options
 +18.1.2.1 Handwriting personalization
 +18.1.2.2 Ensure 'Allow users to enable online speech recognition services' is set to 'Disabled'
 +###18.1.3 Ensure 'Allow Online Tips' is set to 'Disabled'
 ##18.2 Desktop ##18.2 Desktop
 NA NA
行 135: 行 280:
 NA NA
 ##18.4 MS Security Guide ##18.4 MS Security Guide
 +18.4.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' (MS only)
 +18.4.2 Ensure 'Configure RPC packet level privacy setting for incoming connections' is set to 'Enabled'
 +18.4.3 Ensure 'Configure SMB v1 client driver' is set to 'Enabled: Disable driver (recommended)'
 +18.4.4 Ensure 'Configure SMB v1 server' is set to 'Disabled'
 +18.4.5 Ensure 'Enable Certificate Padding' is set to 'Enabled'
 +18.4.6 Ensure 'Enable Structured Exception Handling Overwrite Protection (SEHOP)' is set to 'Enabled'
 +18.4.7 Ensure 'NetBT NodeType configuration' is set to 'Enabled: P-node (recommended)'
 +18.4.8 Ensure 'WDigest Authentication' is set to 'Disabled'
 ##18.5 MSS(Legacy) ##18.5 MSS(Legacy)
 +18.5.1 Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon' is set to 'Disabled'
 +18.5.2 Ensure 'MSS: (DisableIPSourceRouting IPv6) IP source routing protection level' is set to 'Enabled: Highest protection, source routing is completely disabled'
 +18.5.3 Ensure 'MSS: (DisableIPSourceRouting) IP source routing protection level' is set to 'Enabled: Highest protection, source routing is completely disabled'
 +18.5.4 Ensure 'MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes' is set to 'Disabled'
 +18.5.5 (L2) Ensure 'MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds' is set to 'Enabled: 300,000 or 5 minutes'
 +18.5.6 Ensure 'MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers' is set to 'Enabled'
 +18.5.7 (L2) Ensure 'MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses' is set to 'Disabled'
 +18.5.8 Ensure 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode' is set to 'Enabled'
 +18.5.9 Ensure 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires' is set to 'Enabled: 5 or fewer seconds'
 +18.5.10 (L2) Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3'
 +18.5.11 (L2) Ensure 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3'
 +18.5.12 Ensure 'MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning' is set to 'Enabled: 90% or less'
 ##18.6 Network ##18.6 Network
 +
 ##18.7 Printers ##18.7 Printers
 ##18.8 Start Menu and Taskbar ##18.8 Start Menu and Taskbar
行 151: 行 317:
 NA NA
 ##19.5 Start Menu and Taskbar ##19.5 Start Menu and Taskbar
 +###19.5.1 Notifications
 +19.5.1 Ensure 'Turn off toast notifications on the lock screen' is set to 'Enabled'
 ##19.6 System ##19.6 System
 +19.6.1 Ctrl+Alt+Del Options
 +19.6.2 Display
 +19.6.3 Driver Installation
 +19.6.4 Folder Redirection
 +19.6.5 Group Policy
 +19.6.6 Internet Communication Management
 +19.6.6.1 Internet Communication settings
 ##19.7 Windows Components ##19.7 Windows Components
 +###19.7.1 Account Notifications
 +NA
 +###19.7.2 Add features to Windows 8 / 8.1 / 10 (formerly Windows Anytime Upgrade)
 +NA
 +###19.7.3 App runtime
 +###19.7.4 Application Compatibility
 +###19.7.5 Attachment Manager
 +19.7.5.1 Ensure 'Do not preserve zone information in file attachments' is set to 'Disabled'
 +19.7.5.2 Ensure 'Notify antivirus programs when opening attachments' is set to 'Enabled'
 +###19.7.6 AutoPlay Policies
 +NA
 +###19.7.7 Calculator
 +NA
 +###19.7.8 Cloud Content
 +19.7.8.1 Ensure 'Configure Windows spotlight on lock screen' is set to 'Disabled'
 +19.7.8.2 Ensure 'Do not suggest third-party content in Windows spotlight' is set to 'Enabled'
 +19.7.8.3 Ensure 'Do not use diagnostic data for tailored experiences' is set to 'Enabled'
 +19.7.8.4 Ensure 'Turn off all Windows spotlight features' is set to 'Enabled'
 +19.7.8.5 Ensure 'Turn off Spotlight collection on Desktop' is set to 'Enabled'
 +###19.7.9 Credential User Interface
 +NA
 +###19.7.10 Data Collection and Preview Builds
 +NA
 +###19.7.11 Desktop Gadgets
 +NA
 +###19.7.12 Desktop Window Manager
 +NA
 +###19.7.13 Digital Locker
 +NA
 +###19.7.14 Edge UI
 +NA
 +###19.7.15 File Explorer (formerly Windows Explorer)
 +NA
 +###19.7.16 File Revocation
 +NA
 +###19.7.17 IME
 +NA
 +###19.7.18 Instant Search
 +NA
 +###19.7.19 Internet Explorer
 +NA
 +###19.7.20 Location and Sensors
 +NA
 +###19.7.21 Microsoft Edge
 +NA
 +###19.7.22 Microsoft Management Console
 +NA
 +###19.7.23 Microsoft User Experience Virtualization
 +NA
 +###19.7.24 Multitasking
 +NA
 +###19.7.25 NetMeeting
 +NA
 +###19.7.26 Network Sharing
 +19.7.26.1 Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled'
 +###19.7.27 OOBE
 +NA
 +###19.7.28Presentation Settings
 +NA
 +###19.7.29 Remote Desktop Services (formerly Terminal Services)
 +NA
 +###19.7.30 RSS Feeds
 +NA
 +###19.7.31 Search
 +NA
 +###19.7.32 Sound Recorder
 +NA
 +###19.7.33 Store
 +NA
 +###19.7.34 Tablet PC
 +NA
 +###19.7.35 Task Scheduler
 +NA
 +###19.7.36 Windows Calendar
 +NA
 +###19.7.37 Windows Color System
 +NA
 +###19.7.38 Windows Copilot
 +NA
 +###19.7.39 Windows Defender SmartScreen
 +NA
 +###19.7.40 Windows Error Reporting
 +NA
 +###19.7.41 Windows Hello for Business (formerly Microsoft Passport for Work)
 +NA
 +###19.7.42 Windows Installer
 +19.7.42.1 Ensure 'Always install with elevated privileges' is set to 'Disabled'
 +###19.7.43 Windows Logon Options
 +NA
 +###19.7.44 Windows Media Player
 +19.7.44.1 Networking
 +19.7.44.2 Playback
 +19.7.44.2.1 Ensure 'Prevent Codec Download' is set to 'Enabled'
resources/os/windows_server_2022/baseline.1732012980.txt.gz · 最后更改: jackiez