Windowsmachine
Windowsmachine
XCS-2K19-LIVE
Author DEMO2012R2\sysadmin
Version 1.21
Disclaimer
Client Information 8
Relationships 9
Relationship Map 10
Management Summary
Compliance Benchmarks
Location
Hardware
BIOS Information 25
Disk Drives 27
Disk Shelves 31
Disk Shelf 01 32
Volumes 33
\\?\Volume{91695457-0000-0000-0000-100000000000}\ 34
C: 35
E: (ReFS Volume) 37
Devices 38
Physical Memory 41
Printers 42
Processors 45
Tape Libraries 47
Tape Library 1 48
Video Controllers 49
Networking
Hosts File 51
Network Adapters 53
Ethernet0 54
Remote Settings 58
SNMP Configuration 59
Shares 60
ADMIN$ 61
C$ 62
E$ 63
IPC$ 64
Windows Share 65
Security
Audit Policy 70
Certificate Stores 71
Personal 72
WMSvc-SHA2-XCS-2K19-LIVE 73
Web Hosting 74
LAPS Settings 76
Local Users 77
Administrator 78
DefaultAccount 79
Guest 80
WDAGUtilityAccount 81
Local Groups 82
Microsoft Defender 86
Security Options 87
Software
Application 124
HardwareEvents 128
Parameters 131
Security 132
State 136
System 137
Registry 171
Support Provisions
Version History
Disclaimer
This document is for authorised use by the intended recipient(s) only. It may contain proprietary material,
confidential information and, or be subject to legal privilege. It should not be copied, disclosed to,
retained or used by, any other party.
Microsoft, Windows and Active Directory are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
General Information
Name XCS-2K19-LIVE
System Information
Item ID 1109
Version ID 1.21
ProLiant DL360 G4
Item Identifiers
Tertiary Identifier
Environment Identifier
Client Information
Scan Profile
Target XCS-2K19-LIVE
8 Relationships
Operating System
Domain test2019.net
Hardware Information
Manufacturer HP
Networking
Server Functions
2.01 Set the "Account lockout duration" to 30 minutes or longer Not Applicable
2.02 Set the "Account lockout threshold" to greater than 4 and less than 10 0
2.03 Set the "Reset account lockout after" value to between 15 minutes and 30 minutes 30
3.02 Set the Windows Firewall default inbound action of the domain profile to "Block" Block
3.04 Set the Windows Firewall default inbound action of the public profile to "Block" Block
3.06 Set the Windows Firewall default inbound action of the private profile to "Block" Block
4.01 Rename the local Administrator account to a less easily identifiable account name Administrator
(does not apply to domain controllers)
4.02 Set the local Administrator account to "Disabled" (does not apply to domain
controllers)
4.03 Rename the local Guest account to a less easily identifiable account name (does not
apply to domain controllers)
4.04 Set the local Guest account to "Disabled" (does not apply to domain controllers) True
6.01 Set the "Accounts: Limit local account use of blank passwords to console logon only" Enabled
security option to "Enabled"
6.02 Set the "Devices: Allowed to format and eject removable media" security option to Not Defined
"Administrators"
6.03 Set the "Devices: Prevent users from installing printer drivers" security option to Enabled
"Enabled"
6.04 Set the "Domain controller: LDAP server signing requirements" security option to
"Require signing"
6.05 Set the "Domain member: Require strong (Windows 2000 or later) session key" Enabled
security option to "Enabled"
6.06 Set the "Interactive logon: Don't display last signed-in" security option to "Enabled" Disabled
6.07 Set the "Interactive logon: Do not require CTRL+ALT+DEL" security option to Disabled
"Disabled"
6.08 Set the "Interactive logon: Message text for users attempting to log on" security
option to an appropriate value
6.09 Set the "Interactive logon: Message title for users attempting to log on" security
option to an appropriate value
6.10 Set the "Interactive logon: Number of previous logons to cache (in case domain 10 logons
controller is not available)" security option to "0" for servers and "0" for workstations
6.11 Set the "Network access: Do not allow anonymous enumeration of SAM accounts" Enabled
security option to "Enabled"
6.12 Set the "Network access: Do not allow anonymous enumeration of SAM accounts Disabled
and shares" security option to "Enabled"
6.13 Set the "Network access: Let Everyone permissions apply to anonymous users" Disabled
security option to "Disabled"
6.14 Set the "Credential User Interface: Do not display the password reveal button" Not Defined
security option to "Enabled"
6.15 Set the "Network security: Force logoff when logon hours expire" security option to Disabled
"Enabled"
6.16 Set the "Network security: LAN Manager authentication level" security option to Not Defined
"Send NTLMv2 response only. Refuse LM & NTLM"
6.17 Set the "Network security: LDAP client signing requirements" security option to Negotiate Signing
"Require Signing"
6.18 Set the "Recovery console: Allow automatic administrative logon" security option to Disabled
"Disabled"
6.19 Set the "Recovery Console: Allow floppy copy and access to drives and folders" Disabled
security option to "Disabled"
6.20 Set the "Shutdown: Clear virtual memory pagefile" security option to "Enabled" Disabled
6.21 Set the "Domain controller: Allow server operators to schedule tasks" security option
to "Disabled" (only applies to domain controllers)
6.22 Set the "Domain controller: Refuse machine account password changes" security
option to "Disabled" (only applies to domain controllers)
6.23 Set the "Domain member: Digitally encrypt secure channel data (when possible)" Enabled
security option to "Enabled"
6.24 Set the "Domain member: Digitally sign secure channel data (when possible)" Enabled
security option to "Enabled"
6.25 Set the "Domain member: Digitally encrypt or sign secure channel data (always)" Enabled
security option to "Enabled"
6.26 Set the "Domain member: Disable machine account password changes" security Enabled
option to "Disabled"
6.28 Set the "Interactive logon: Machine inactivity limit" security option to 900 seconds or Not Defined
less
6.29 Set the "Interactive logon: Prompt user to change password before expiration" 5 days
security option to a value between 5 and 10 days
6.30 Set the "Interactive logon: Require Domain Controller authentication to unlock Disabled
workstation" security option to "Enabled" on domain members
6.31 Set the "Interactive logon: Smart card removal behavior" security option to "Lock No Action
Workstation" or greater
6.32 Set the "Microsoft network client: Digitally sign communications (always)" security Disabled
option to "Enabled"
6.33 Set the "Microsoft network client: Digitally sign communications (if server agrees)" Enabled
security option to "Enabled"
6.34 Set the "Microsoft network client: Send unencrypted password to connect to Disabled
third-party SMB servers" security option to "Disabled"
6.35 Set the "Microsoft network server: Amount of idle time required before suspending 15 minutes
session" security option to "15 minutes"
6.36 Set the "Microsoft network server: Digitally sign communications (always)" security Disabled
option to "Enabled"
6.37 Set the "Microsoft network server: Digitally sign communications (if client agrees)" Disabled
security option to "Enabled"
6.38 Set the "Microsoft network server: Disconnect clients when logon hours expire" Enabled
security option to "Enabled"
6.39 Set the "Microsoft network server: Server SPN target name validation level" security Not Defined
option to "Accept if provided by client" or "Required from client"
6.40 Set the "Network access: Do not allow storage of passwords and credentials for Disabled
network authentication" security option to "Enabled"
6.41 Set the "Network access: Named Pipes that can be accessed anonymously" security
option to only contain
[Empty]
6.42 Set the "Network access: Restrict anonymous access to Named Pipes and Shares" Enabled
security option to "Enabled"
6.43 Set the "Network access: Shares that can be accessed anonymously" security option Not Defined
to an empty value
6.44 Set the "Network access: Sharing and security model for local accounts" security Classic - local users authenticate
option to "Classic - Local users authenticate as themselves" as themselves
6.45 Set the "Network security: Allow Local System to use computer identity for NTLM" Not Defined
security option to "Enabled"
6.46 Set the "Network security: Allow LocalSystem NULL session fallback" security option Not Defined
to "Disabled"
6.47 Set the "Network security: Allow PKU2U authentication requests to this computer to Not Defined
use online identities" security option to "Disabled" for domain members
6.48 Set the "Network security: Do not store LAN Manager hash value on next password Enabled
change" security option to "Enabled"
6.49 Set the "Network security: Minimum session security for NTLM SSP based (including Require 128-bit encryption
secure RPC) clients" security option to "Require NTLMv2 session security, Require
128-bit encryption"
6.50 Set the "Network security: Minimum session security for NTLM SSP based (including Require 128-bit encryption
secure RPC) servers" security option to "Require NTLMv2 session security, Require
128-bit encryption"
6.51 Set the "Shutdown: Allow system to be shut down without having to log on" security Disabled
option to "Disabled" (only applies to server operating systems)
6.52 Set the "System objects: Require case insensitivity for non-Windows subsystems" Enabled
security option to "Enabled"
6.54 Set the "User Account Control: Admin Approval Mode for the Built-in Administrator Not Defined
account" security option to "Enabled"
6.55 Set the "User Account Control: Allow UIAccess applications to prompt for elevation Disabled
without using the secure desktop" security option to "Disabled"
6.56 Set the "User Account Control: Behavior of the elevation prompt for administrators in Prompt for consent for
Admin Approval Mode" security option to "Prompt for consent on the secure desktop" non-Windows binaries
6.57 Set the "User Account Control: Behavior of the elevation prompt for standard users" Prompt for credentials
security option to "Automatically deny elevation requests"
6.58 Set the "User Account Control: Detect application installations and prompt for Enabled
elevation" security option to "Enabled"
6.59 Set the "User Account Control: Only elevate UIAccess applications that are installed Enabled
in secure locations" security option to "Enabled"
6.60 Set the "User Account Control: Run all administrators in Admin Approval Mode" Enabled
security option to "Enabled"
6.61 Set the "User Account Control: Switch to the secure desktop when prompting for Enabled
elevation" security option to "Enabled"
6.62 Set the "User Account Control: Virtualize file and registry write failures to per-user Enabled
locations" security option to "Enabled"
6.63 Set the "Accounts: Block Microsoft accounts" security option to "Users can’t add or Not Defined
log on with Microsoft accounts"
6.64 Set the "Audit: Shut down system immediately if unable to log security audits" Disabled
security option to "Disabled"
6.65 Set the "Domain controller: Allow server operators to schedule tasks" security option
to "Disabled" (domain controllers only)
6.66 Set the "Interactive logon: Don't display last signed-in" security option to "Enabled" Disabled
6.67 Set the "File Explorer: Turn off Data Execution Prevention for Explorer" security Not Defined
option to "Disabled"
6.68 Set the "Interactive logon: Machine account lockout threshold" security option to a Not Defined
value between 6 and 10.
6.69 Set the "Network access: Remotely accessible registry paths" security option to System\CurrentControlSet\Control\
include only ProductOptions
Software\Microsoft\Windows NT\CurrentVersion System\CurrentControlSet\Control\
System\CurrentControlSet\Control\ProductOptions Server Applications
System\CurrentControlSet\Control\Server Applications Software\Microsoft\Windows
NT\CurrentVersion
6.70 Set the "Network access: Remotely accessible registry paths and subpaths" security System\CurrentControlSet\Control\
option to include only Print\Printers
Software\Microsoft\OLAP Server System\CurrentControlSet\Service
Software\Microsoft\Windows NT\CurrentVersion\Perflib s\Eventlog
Software\Microsoft\Windows NT\CurrentVersion\Print Software\Microsoft\OLAP Server
Software\Microsoft\Windows NT\CurrentVersion\Windows Software\Microsoft\Windows
System\CurrentControlSet\Control\ContentIndex NT\CurrentVersion\Print
System\CurrentControlSet\Control\Print\Printers Software\Microsoft\Windows
System\CurrentControlSet\Control\Terminal Server NT\CurrentVersion\Windows
System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration System\CurrentControlSet\Control\
System\CurrentControlSet\Control\Terminal Server\UserConfig ContentIndex
System\CurrentControlSet\Services\Eventlog System\CurrentControlSet\Control\
System\CurrentControlSet\Services\SysmonLog Terminal Server
System\CurrentControlSet\Control\
Terminal Server\UserConfig
System\CurrentControlSet\Control\
Terminal
Server\DefaultUserConfiguration
Software\Microsoft\Windows
NT\CurrentVersion\Perflib
System\CurrentControlSet\Service
s\SysmonLog
6.71 Set the "System cryptography: Force strong key protection for user keys stored on Not Defined
the computer" security option to "User is prompted when the key is first used" or
higher
6.73 Set the "System settings: Use certificate rules on Windows executables for Software Disabled
Restriction Policies" security option to "Enabled"
6.74 Set the "Credential User Interface: Enumerate administrator accounts on elevation" Not Defined
security option to "Disabled"
6.75 Set the "AutoPlay Policies: Disallow Autoplay for non-volume devices" security option Not Defined
to "Enabled"
6.76 Set the "AutoPlay Policies: Set the default behavior for AutoRun" security option to Not Defined
"Do not execute any autorun commands"
6.77 Set the "AutoPlay Policies: Turn off Autoplay" security option to "All drives" Not Defined
6.78 Set the "Remote Procedure Call: Enable RPC Endpoint Mapper Client Not Defined
Authentication" security option to "Enabled" (does not apply to domain controllers)
6.79 Set the "Remote Procedure Call: Restrict Unauthenticated RPC clients" security Not Defined
option to "Authenticated" (does not apply to domain controllers)
7.01 Set "Audit: Audit the access of global system objects" to "Disabled" Disabled
7.02 Set "Audit: Audit the use of Backup and Restore privilege" to "Disabled" Disabled
7.03 Set "Audit: Force audit policy subcategory settings (Windows Vista or later) to Not Defined
override audit policy category settings" to "Enabled"
7.04 Set the "Audit Credential Validation" advanced audit policy to "Success and Failure" Success
7.05 Set the "Audit Kerberos Authentication Service" advanced audit policy to "Success Success
and Failure"
7.06 Set the "Audit Kerberos Service Ticket Operations" advanced audit policy to Success
"Success and Failure"
7.07 Set the "Audit Other Account Logon Events" advanced audit policy to "Success and
Failure"
7.08 Set the "Audit Application Group Management" advanced audit policy to "None"
7.09 Set the "Audit Computer Account Management" advanced audit policy to "Success Success
and Failure"
7.10 Set the "Audit Distribution Group Management" advanced audit policy to "None"
7.11 Set the "Audit Other Account Management Events" advanced audit policy to
"Success and Failure"
7.12 Set the "Audit Security Group Management" advanced audit policy to "Success and Success
Failure"
7.13 Set the "Audit User Account Management" advanced audit policy to "Success and Success
Failure"
7.14 Set the "Audit DPAPI Activity" advanced audit policy to "Success and Failure"
7.15 Set the "Audit PNP Activity" advanced audit policy to "Any"
7.16 Set the "Audit Process Creation" advanced audit policy to "Success and Failure"
7.17 Set the "Audit Process Termination" advanced audit policy to "None"
7.18 Set the "Audit RPC Events" advanced audit policy to "None"
7.19 Set the "Audit Detailed Directory Service Replication" advanced audit policy to
"None"
7.20 Set the "Audit Directory Service Access" advanced audit policy to "None"
7.21 Set the "Audit Directory Service Changes" advanced audit policy to "None"
7.22 Set the "Audit Directory Service Replication" advanced audit policy to "None"
7.23 Set the "Audit Account Lockout" advanced audit policy to "Success" Success
7.25 Set the "Audit IPsec Extended Mode" advanced audit policy to "None"
7.26 Set the "Audit IPsec Main Mode" advanced audit policy to "None"
7.27 Set the "Audit IPsec Quick Mode" advanced audit policy to "None"
7.28 Set the "Audit Logoff" advanced audit policy to "Success" Success
7.29 Set the "Audit Logon" advanced audit policy to "Success and Failure" Success and Failure
7.30 Set the "Audit Network Policy Server" advanced audit policy to "None" Success and Failure
7.31 Set the "Audit Other Logon/Logoff Events" advanced audit policy to "None"
7.32 Set the "Audit Special Logon" advanced audit policy to "Success and Failure" Success
7.33 Set the "Audit User/Device Claims" advanced audit policy to "None"
7.34 Set the "Audit Application Generated" advanced audit policy to "None"
7.35 Set the "Audit Central Access Policy Staging" advanced audit policy to "None"
7.36 Set the "Audit Certification Services" advanced audit policy to "None"
7.37 Set the "Audit Detailed File Share" advanced audit policy to "None"
7.38 Set the "Audit File Share" advanced audit policy to "None"
7.39 Set the "Audit File System" advanced audit policy to "None"
7.40 Set the "Audit Filtering Platform Connection" advanced audit policy to "None"
7.41 Set the "Audit Filtering Platform Packet Drop" advanced audit policy to "None"
7.42 Set the "Audit Handle Manipulation" advanced audit policy to "None"
7.43 Set the "Audit Kernel Object" advanced audit policy to "None"
7.44 Set the "Audit Other Object Access Events" advanced audit policy to "None"
7.46 Set the "Audit Removable Storage" advanced audit policy to "None"
7.48 Set the "Audit Audit Policy Change" advanced audit policy to "Success and Failure" Success
7.49 Set the "Audit Authentication Policy Change" advanced audit policy to "Success and Success
Failure"
7.50 Set the "Audit Authorization Policy Change" advanced audit policy to "None"
7.51 Set the "Audit Filtering Platform Policy Change" advanced audit policy to "None"
7.52 Set the "Audit MPSSVC Rule-Level Policy Change" advanced audit policy to
"Success"
7.53 Set the "Audit Other Policy Change Events" advanced audit policy to "None"
7.54 Set the "Audit Non Sensitive Privilege Use" advanced audit policy to "None"
7.55 Set the "Audit Other Privilege Use Events" advanced audit policy to "None"
7.56 Set the "Audit Sensitive Privilege Use" advanced audit policy to "None"
7.57 Set the "Audit IPsec Driver" advanced audit policy to "Success and Failure"
7.58 Set the "Audit Other System Events" advanced audit policy to "None" Success and Failure
7.59 Set the "Audit Security State Change" advanced audit policy to "Success and Failure" Success
7.60 Set the "Audit Security System Extension" advanced audit policy to "Success and
Failure"
7.61 Set the "Audit System Integrity" advanced audit policy to "Success and Failure" Success and Failure
8.01 Set the "Sign-in last interactive user automatically after a system-initiated restart" Disabled
security setting to "Disabled" on Windows Server 2012 R2 and above
8.02 Enable Windows Update to receive updates Never check for updates (not
recommended)
8.03 Configure Windows Update to use Windows Server Update Services (WSUS)
9.02 Set the NTP client type to "Domain Hierarchy (NT5DS)" for workstations and member Domain Hierarchy (NT5DS)
servers, and "NTP" for PDC emulators and machines on workgroups"
9.03 Enable the NTP server for domain controllers, and disable for member servers and False
workstations
10.01 If SNMP is enabled, ensure that no "public" or "private" SNMP community strings are public
configured
10.02 If SNMP is enabled, ensure that no writable SNMP community strings are configured public [Read Only]
11.01 Ensure that Server Message Block (SMB) version 1 is disabled for the server service Server Feature Disabled
12.01 Set the maximum size of the Application event log to 40,960 KB or greater 20,480 KB
12.02 Set the maximum size of the Security event log to 81,920 KB or greater 20,480 KB
12.03 Set the maximum size of the System event log to 20,480 KB or greater 20,480 KB
12.04 Set the retention policy of the Application event log to 'Overwrite events as needed Do not overwrite events (Clear logs
(oldest events first)' manually)
12.05 Set the retention policy of the Security event log to 'Overwrite events as needed Overwrite events as needed (oldest
(oldest events first)' events first)
12.06 Set the retention policy of the System event log to 'Overwrite events as needed Archive the log when full, do not
(oldest events first)' overwrite events
13.01 Set the "Access Credential Manager as a trusted caller" user right to [Empty]
13.02 Set the "Access this computer from the network" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
NT AUTHORITY\Authenticated Users BUILTIN\Users
Everyone
13.03 Set the "Act as part of the operating system" user right to [Empty]
13.05 Set the "Adjust memory quotas for a process" user right to include only BUILTIN\Administrators
BUILTIN\Administrators IIS APPPOOL\.NET v4.5
IIS APPPOOL\% IIS APPPOOL\.NET v4.5 Classic
NT AUTHORITY\LOCAL SERVICE IIS APPPOOL\DefaultAppPool
NT AUTHORITY\NETWORK SERVICE NT AUTHORITY\LOCAL SERVICE
NT SERVICE\MSSQL% NT AUTHORITY\NETWORK
NT SERVICE\SQLAgent% SERVICE
NT SERVICE\SQLSERVERAGENT NT
SERVICE\MSSQL$SQLEXPRESS
NT SERVICE\SQLAgent$SQLEXP
RESS
13.06 Set the "Allow log on locally" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
BUILTIN\Backup Operators BUILTIN\Users
BUILTIN\Users
13.07 Set the "Allow log on through Remote Desktop Services" user right to include only BUILTIN\Administrators
13.08 Set the "Back up files and directories" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
BUILTIN\Backup Operators
13.09 Set the "Bypass traverse checking" user right to [Any Value] BUILTIN\Administrators
BUILTIN\Backup Operators
BUILTIN\Users
Everyone
NT AUTHORITY\LOCAL SERVICE
NT AUTHORITY\NETWORK
SERVICE
NT
SERVICE\MSSQL$SQLEXPRESS
NT SERVICE\SQLAgent$SQLEXP
RESS
13.10 Set the "Change the system time" user right to include only BUILTIN\Administrators
BUILTIN\Administrators NT AUTHORITY\LOCAL SERVICE
NT AUTHORITY\LOCAL SERVICE
13.11 Set the "Change the time zone" user right to [Any Value] BUILTIN\Administrators
NT AUTHORITY\LOCAL SERVICE
13.12 Set the "Create a pagefile" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.14 Set the "Create global objects" user right to include only BUILTIN\Administrators
BUILTIN\Administrators NT AUTHORITY\LOCAL SERVICE
NT AUTHORITY\LOCAL SERVICE NT AUTHORITY\NETWORK
NT AUTHORITY\NETWORK SERVICE SERVICE
NT AUTHORITY\SERVICE NT AUTHORITY\SERVICE
13.15 Set the "Create permanent shared objects" user right to [Empty]
13.16 Set the "Create symbolic links" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
NT VIRTUAL MACHINE\Virtual Machines
13.17 Set the "Debug programs" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.18 Set the "Deny access to this computer from the network" user right to must include
BUILTIN\Guests
13.19 Set the "Deny log on as a batch job" user right to must include
BUILTIN\Guests
13.20 Set the "Deny log on as a service" user right to must include
BUILTIN\Guests
13.21 Set the "Deny log on locally" user right to must include
BUILTIN\Guests
13.22 Set the "Deny log on through Remote Desktop Services" user right to must include
BUILTIN\Guests
13.23 Set the "Enable computer and user accounts to be trusted for delegation" user right
to [Empty]
13.24 Set the "Force shutdown from a remote system" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.25 Set the "Generate security audits" user right to include only IIS APPPOOL\.NET v4.5
IIS APPPOOL\% IIS APPPOOL\.NET v4.5 Classic
NT AUTHORITY\LOCAL SERVICE IIS APPPOOL\DefaultAppPool
NT AUTHORITY\NETWORK SERVICE NT AUTHORITY\LOCAL SERVICE
NT SERVICE\adfssrv NT AUTHORITY\NETWORK
NT SERVICE\drs SERVICE
13.26 Set the "Impersonate a client after authentication" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\IIS_IUSRS
BUILTIN\IIS_IUSRS NT AUTHORITY\LOCAL SERVICE
NT AUTHORITY\LOCAL SERVICE NT AUTHORITY\NETWORK
NT AUTHORITY\NETWORK SERVICE SERVICE
NT AUTHORITY\SERVICE NT AUTHORITY\SERVICE
13.28 Set the "Increase scheduling priority" user right to include only BUILTIN\Administrators
BUILTIN\Administrators Window Manager\Window
Window Manager\Window Manager Group Manager Group
13.29 Set the "Load and unload device drivers" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.31 Set the "Log on as a batch job" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
BUILTIN\Backup Operators BUILTIN\IIS_IUSRS
BUILTIN\IIS_IUSRS BUILTIN\Performance Log Users
BUILTIN\Performance Log Users
13.32 Set the "Log on as a service" user right to include only IIS APPPOOL\.NET v4.5
IIS APPPOOL\% IIS APPPOOL\.NET v4.5 Classic
NT AUTHORITY\NETWORK SERVICE IIS APPPOOL\DefaultAppPool
NT SERVICE\% NT AUTHORITY\NETWORK
SERVICE
NT SERVICE\ALL SERVICES
NT
SERVICE\MSSQL$SQLEXPRESS
NT SERVICE\SQLAgent$SQLEXP
RESS
NT SERVICE\SQLTELEMETRY$S
QLEXPRESS
S-1-5-21-130050434-2330574090-
1807454070-1001
TEST2019\sysadmin
XCS-2K19-LIVE\SQLServer2005S
QLBrowserUser$XCS-2K19-LIVE
13.33 Set the "Manage auditing and security log" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.35 Set the "Modify firmware environment values" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.36 Set the "Obtain an impersonation token for another user in the same session" user BUILTIN\Administrators
right to include only
BUILTIN\Administrators
13.37 Set the "Perform volume maintenance tasks" user right to include only BUILTIN\Administrators
BUILTIN\Administrators NT
SERVICE\MSSQL$SQLEXPRESS
13.38 Set the "Profile single process" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.39 Set the "Profile system performance" user right to include only BUILTIN\Administrators
BUILTIN\Administrators NT SERVICE\WdiServiceHost
NT SERVICE\WdiServiceHost
13.40 Set the "Remove computer from docking station" user right to [Any Value] BUILTIN\Administrators
13.41 Set the "Replace a process level token" user right to include only IIS APPPOOL\.NET v4.5
IIS APPPOOL\% IIS APPPOOL\.NET v4.5 Classic
NT AUTHORITY\LOCAL SERVICE IIS APPPOOL\DefaultAppPool
NT AUTHORITY\NETWORK SERVICE NT AUTHORITY\LOCAL SERVICE
NT SERVICE\% NT AUTHORITY\NETWORK
SERVICE
NT
SERVICE\MSSQL$SQLEXPRESS
NT SERVICE\SQLAgent$SQLEXP
RESS
13.42 Set the "Restore files and directories" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
13.43 Set the "Shut down the system" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
13.44 Set the "Synchronize directory service data" user right to [Empty]
14.01 Set "Allow Basic Authentication" to "False" for the WinRM Client True
14.02 Set "Allow Digest Authentication" to "False" for the WinRM Client True
14.03 Set "Allow Unencrypted Traffic" to "False" for the WinRM Client False
14.04 Set "Allow Basic Authentication" to "False" for the WinRM Service False
14.05 Set "Allow Unencrypted Traffic" to "False" for the WinRM Service False
14.06 Set "Disallow Storing RunAs Credentials" to "True" for the WinRM Service False
14.07 Set "Allow Remote Shell Access" to "True" for the Windows Remote Shell True
15.01 Set "Connection Mode" to "Don't allow remote connections" or "Only allow Only allow connections with
connections with network level authentication (more secure)" network level authentication (more
secure)
City Oxford
Room
Rack
Name Rack 1A
Hardware Information
Manufacturer HP
ProLiant DL360 G4
Virtualization
Enclosure Details
Enclosure Model
System Information
UUID 00F74D56-E96D-D0DD-3F3D-211AFFEBEEDB
Current Language
2 Disk Drives
[0] VMware, VMware Virtual S SCSI Disk Device Serial Attached SCSI (SAS) Master Boot Record (MBR) 60.00GB
[1] VMware Virtual SATA Hard Drive Serial ATA (SATA) 00000000000000000001 GUID Partition Table (GPT) 60.00GB
General
Manufacturer VMware,
Serial Number
Size 60.00GB
Location SCSI0
Status
Operational Status OK
Storage Pools
2 Partitions
C:
Active False
Volume Name
Size 59.46GB
General
Size 60.00GB
Location sata0
GUID {4776686d-29d4-46b0-a99f-08da31add65a}
Signature
Status
Operational Status OK
Storage Pools
Unallocated Space
1 Partitions
E:
Active False
Size 59.94GB
Item ID 1007
Hardware Information
Model DS04
3 Volumes
Volume Details
Capacity 549.00MB
Drive Letter
Enabled False
Volume Details
Capacity 59.46GB
Drive Letter C:
Label
Enabled True
Disk Quota
State Tracked
12 Quota Entries
Volume Details
Capacity 59.94GB
Drive Letter E:
Enabled False
Batteries
Computer
Disk drives
VMware Virtual SATA Hard Drive Microsoft 10.0.17763.1 Device is working properly.
VMware, VMware Virtual S SCSI Disk Device Microsoft 10.0.17763.1 Device is working properly.
Display adapters
DVD/CD-ROM drives
Intel(R) 82371AB/EB PCI Bus Master IDE Microsoft 10.0.17763.1 Device is working properly.
Controller
VMware USB Pointing Device VMware, Inc. 12.5.4.0 Device is working properly.
VMware USB Pointing Device VMware, Inc. 12.5.4.0 Device is working properly.
Monitors
Network adapters
Intel(R) 82574L Gigabit Network Connection Microsoft 12.15.22.6 Device is working properly.
Microsoft Kernel Debug Network Adapter Microsoft 10.0.17763.1 Device is working properly.
Print queues
Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz Microsoft 10.0.17763.1 Device is working properly.
Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz Microsoft 10.0.17763.1 Device is working properly.
Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz Microsoft 10.0.17763.1 Device is working properly.
Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz Microsoft 10.0.17763.1 Device is working properly.
Software devices
Microsoft Radio Device Enumeration Bus Microsoft 10.0.17763.1 Device is working properly.
Storage controllers
LSI Adapter, SAS 3000 series, 8-port with 1068 LSI 1.34.3.83 Device is working properly.
Storage volumes
Standard Enhanced PCI to USB Host Controller Microsoft 10.0.17763.1 Device is working properly.
Standard Universal PCI to USB Host Controller Microsoft 10.0.17763.1 Device is working properly.
Standard USB 3.0 eXtensible Host Controller - 1.0 Microsoft 10.0.17763.1 Device is working properly.
(Microsoft)
USB Root Hub (USB 3.0) Microsoft 10.0.17763.1 Device is working properly.
Physical Memory
2 Printers
Printer Properties
Comment
Capabilities Copies
Color
Collate
Location
Separator Page
Advanced
Priority 1
Share Configuration
Permissions
Printer Properties
Comment
Capabilities Copies
Color
Location
Separator Page
Advanced
Priority 1
Share Configuration
Permissions
1 Processors
Manufacturer GenuineIntel
Number Of Cores 4
NumberOfLogicalProcessors 4
Processor Id 1F8BFBFF000506E3
Virtualization Settings
Item ID 1097
Hardware Information
Model TL01
1 Video Controllers
VMware SVGA 3D
Drivers vm3dum64.dll
vm3dum64_10.dll
Networking Information
Advanced
Shares 5
General
File Type
Hidden False
Advanced
Encrypted False
Compressed False
Security
Owner NT AUTHORITY\SYSTEM
NTFS Permissions
NT AUTHORITY\SYSTEM False Allow Change permissions, Delete subfolders This folder only
and files, Modify, Take ownership
BUILTIN\Administrators False Allow Change permissions, Delete subfolders This folder only
and files, Modify, Take ownership
ALL APPLICATION PACKAGES False Allow Read & execute This folder only
ALL RESTRICTED APPLICATION PACKAGES False Allow Read & execute This folder only
File Contents
1 Network Adapters
Ethernet0 Device is working properly. Intel(R) 82574L Gigabit Network Connection 00-0C-29-EB-EE-DB
Ethernet0
Index 0005
Network Category
IP Configuration
IP Addresses fe80::5846:858b:d8dc:93fb%5/0.0.0.64
192.168.131.201/24
WINS Settings
Advanced Properties
Packet Priority & VLAN *PriorityVLANTag Packet Priority & VLAN Enabled 3
11 Active Routes
255.255.255.255 255.255.255.255 0.0.0.0 Intel(R) 82574L Gigabit Network Connection 281 Local
224.0.0.0 240.0.0.0 0.0.0.0 Intel(R) 82574L Gigabit Network Connection 281 Local
192.168.131.255 255.255.255.255 0.0.0.0 Intel(R) 82574L Gigabit Network Connection 281 Local
192.168.131.201 255.255.255.255 0.0.0.0 Intel(R) 82574L Gigabit Network Connection 281 Local
192.168.131.0 255.255.255.0 0.0.0.0 Intel(R) 82574L Gigabit Network Connection 281 Local
1 Persistent Routes
Connection Mode Only allow connections with network level authentication (more secure)
Certificate
Redirection Settings
Temporary Folders
Enabled True
SNMP Settings
Installed True
Started True
Location DC1
Contact [email protected]
SNMP Communities
Name Type
SNMP Traps
public 192.168.1.1
5 Shares
Path C:\Windows
Cache Setting Only files and folders that users specify are available offline.
Security
Owner NT SERVICE\TrustedInstaller
NTFS Permissions
CREATOR OWNER False Allow Change permissions, Delete Subfolders and files only
subfolders and files, Modify,
Take ownership
NT AUTHORITY\SYSTEM False Allow Change permissions, Delete Subfolders and files only
subfolders and files, Modify,
Take ownership
BUILTIN\Administrators False Allow Change permissions, Delete Subfolders and files only
subfolders and files, Modify,
Take ownership
ALL APPLICATION PACKAGES False Allow Read & execute This folder only
ALL APPLICATION PACKAGES False Allow Read, Write Subfolders and files only
ALL RESTRICTED APPLICATION PACKAGES False Allow Read & execute This folder only
ALL RESTRICTED APPLICATION PACKAGES False Allow Read, Write Subfolders and files only
Path C:\
Cache Setting Only files and folders that users specify are available offline.
Security
Owner NT SERVICE\TrustedInstaller
NTFS Permissions
CREATOR OWNER False Allow Change permissions, Delete subfolders and Subfolders and files only
files, Modify, Take ownership
NT AUTHORITY\SYSTEM False Allow Change permissions, Delete subfolders and This folder, subfolders and files
files, Modify, Take ownership
BUILTIN\Administrators False Allow Change permissions, Delete subfolders and This folder, subfolders and files
files, Modify, Take ownership
BUILTIN\Users False Allow Create folders / append data This folder and subfolders
BUILTIN\Users False Allow Read & execute This folder, subfolders and files
Path E:\
Cache Setting Only files and folders that users specify are available offline.
Security
Owner BUILTIN\Administrators
NTFS Permissions
Everyone False Allow Read & execute This folder, subfolders and files
CREATOR OWNER False Allow Change permissions, Delete subfolders and Subfolders and files only
files, Modify, Take ownership
NT AUTHORITY\SYSTEM False Allow Change permissions, Delete subfolders and This folder, subfolders and files
files, Modify, Take ownership
BUILTIN\Administrators False Allow Change permissions, Delete subfolders and This folder, subfolders and files
files, Modify, Take ownership
BUILTIN\Users False Allow Create folders / append data This folder and subfolders
BUILTIN\Users False Allow Create files / write data, Read & execute This folder, subfolders and files
Path
Maximum Allowed 3
Cache Setting All files and programs the users opens are automatically available offline. Optimized for performance.
Share Permissions
Security
Owner TEST2019\sysadmin
NTFS Permissions
Everyone False Allow Read & execute This folder, subfolders and files
NT AUTHORITY\SYSTEM False Allow Change permissions, Delete subfolders and This folder, subfolders and files
files, Modify, Take ownership
BUILTIN\Administrators False Allow Change permissions, Delete subfolders and This folder, subfolders and files
files, Modify, Take ownership
TEST2019\sysadmin False Allow Change permissions, Delete subfolders and This folder, subfolders and files
files, Modify, Take ownership
Security Identifiers
Local Administrator
Name Administrator
Enabled True
Guest Account
Name Guest
Enabled False
Local Administrators
Name Administrators
Account Logon
Account Management
Detailed Tracking
DS Access
Logon/Logoff
Object Access
Policy Change
System
Personal 1
Trusted People 0
Trusted Publisher 0
Web Hosting 0
1 Certificates
General
Subject CN=WMSvc-SHA2-XCS-2K19-LIVE
Issuer CN=WMSvc-SHA2-XCS-2K19-LIVE
Certificate Details
Version 3
Properties
Thumbprint 49A0CBAB284B6E61DDB4EF836C1B362CAC4459FF
Password Policy
General Settings
Installed True
Enabled True
Policy Settings
Password Length 14
Guest Built-in account for guest access to the computer/domain True True
WDAGUtilityAccount A user account managed and used by the system for Windows Defender Application False False
Guard scenarios.
Account Details
Name Administrator
Enabled True
Profile
Home Drive Z:
Account Details
Name DefaultAccount
Enabled False
Full Name
Profile
Profile Path
Login Script
Home Drive
Home Directory
Account Details
Name Guest
Enabled False
Full Name
Profile
Profile Path
Login Script
Home Drive
Home Directory
Account Details
Name WDAGUtilityAccount
Description A user account managed and used by the system for Windows Defender Application Guard scenarios.
Enabled False
Full Name
Profile
Profile Path
Login Script
Home Drive
Home Directory
Description Members of this group can remotely query authorization attributes and permissions for resources on
this computer.
Members
Administrators
Backup Operators
Description Backup Operators can override security restrictions for the sole purpose of backing up or restoring files
Members
Description Members of this group are allowed to connect to Certification Authorities in the enterprise
Members
Cryptographic Operators
Members
Device Owners
Members
Description Members are allowed to launch, activate and use Distributed COM objects on this machine.
Members
Description Members of this group can read event logs from local machine
Members
Guests
Description Guests have the same access as members of the Users group by default, except for the Guest account
which is further restricted
Members XCS-2K19-LIVE\Guest
Hyper-V Administrators
Description Members of this group have complete and unrestricted access to all features of Hyper-V.
Members
IIS_IUSRS
Members
Description Members in this group can have some administrative privileges to manage configuration of networking
features
Members
Description Members of this group may schedule logging of performance counters, enable trace providers, and
collect event traces both locally and via remote access to this computer
Members
Description Members of this group can access performance counter data locally and remotely
Members NT SERVICE\MSSQL$SQLEXPRESS
NT SERVICE\SQLAgent$SQLEXPRESS
Power Users
Description Power Users are included for backwards compatibility and possess limited administrative powers
Members
Print Operators
Members
Description Servers in this group run virtual machines and host sessions where users RemoteApp programs and
personal virtual desktops run. This group needs to be populated on servers running RD Connection
Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to
be in this group.
Members
Description Servers in this group can perform routine administrative actions on servers running Remote Desktop
Services. This group needs to be populated on all servers in a Remote Desktop Services deployment.
The servers running the RDS Central Management service must be included in this group.
Members
Description Servers in this group enable users of RemoteApp programs and personal virtual desktops access to
these resources. In Internet-facing deployments, these servers are typically deployed in an edge
network. This group needs to be populated on servers running RD Connection Broker. RD Gateway
servers and RD Web Access servers used in the deployment need to be in this group.
Members
Description Members in this group are granted the right to logon remotely
Members TEST2019\sysuser
Description Members of this group can access WMI resources over management protocols (such as
WS-Management via the Windows Remote Management service). This applies only to WMI
namespaces that grant access to the user.
Members
Replicator
Members
SQLServer2005SQLBrowserUser$XCS-2K19-LIVE
Description Members in the group have the required access and privileges to be assigned as the log on account for
the associated instance of SQL Server Browser.
Members NT SERVICE\SQLBrowser
Description Members of this group have complete and unrestricted access to all features of Storage Replica.
Members
Members XCS-2K19-LIVE\DefaultAccount
Users
Description Users are prevented from making accidental or intentional system-wide changes and can run most
applications
General Settings
Antivirus Signature
Cloud
Exclusions
Accounts: Limit local account use of blank passwords to console logon only Enabled Configured Locally
App Runtime: Allow Microsoft accounts to be optional Not Defined Not Defined
Audit Process Creation: Include command line in process creation events Not Defined Not Defined
Audit: Audit the access of global system objects Disabled Configured Locally
Audit: Audit the use of Backup and Restore privilege Disabled Configured Locally
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category Not Defined Not Defined
settings.
Audit: Shut down system immediately if unable to log security audits Disabled Configured Locally
AutoPlay Policies: Disallow Autoplay for non-volume devices Not Defined Not Defined
AutoPlay Policies: Set the default behavior for AutoRun Not Defined Not Defined
Credential User Interface: Do not display the password reveal button Not Defined Not Defined
Credential User Interface: Enumerate administrator accounts on elevation Not Defined Not Defined
DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined Not Defined
DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined Not Defined
Devices: Allowed to format and eject removable media Not Defined Not Defined
Devices: Prevent users from installing printer drivers Enabled Configured Locally
Devices: Restrict CD-ROM access to locally logged-on user only Not Defined Not Defined
Domain controller: Allow server operators to schedule tasks Not Defined Not Defined
Domain controller: LDAP server signing requirements Not Defined Not Defined
Domain controller: Refuse machine account password changes Disabled Default Domain Policy
Domain member: Digitally encrypt or sign secure channel data (always) Enabled Configured Locally
Domain member: Digitally encrypt secure channel data (when possible) Enabled Configured Locally
Domain member: Digitally sign secure channel data (when possible) Enabled Configured Locally
Domain member: Disable machine account password changes Enabled Default Domain Policy
Domain member: Maximum machine account password age 30 days Configured Locally
Domain member: Require strong (Windows 2000 or later) session key Enabled Configured Locally
Early Launch Antimalware: Boot-Start Driver Initialization Policy Not Defined Not Defined
EMET: Default Action and Mitigation Settings: Anti Detours Not Defined Not Defined
EMET: Default Action and Mitigation Settings: Banned Functions Not Defined Not Defined
EMET: Default Action and Mitigation Settings: Deep Hooks Not Defined Not Defined
EMET: Default Action and Mitigation Settings: Exploit Action Not Defined Not Defined
Event Log: Application: Control Event Log behavior when the log file reaches its maximum size Enabled Default Domain Policy
Event Log: Application: Specify the maximum log file size (KB) Not Defined Not Defined
Event Log: Security: Control Event Log behavior when the log file reaches its maximum size Disabled Default Domain Policy
Event Log: Security: Specify the maximum log file size (KB) Not Defined Not Defined
Event Log: Setup: Control Event Log behavior when the log file reaches its maximum size Not Defined Not Defined
Event Log: Setup: Specify the maximum log file size (KB) Not Defined Not Defined
Event Log: System: Control Event Log behavior when the log file reaches its maximum size Not Defined Not Defined
Event Log: System: Specify the maximum log file size (KB) Not Defined Not Defined
File Explorer: Turn off Data Execution Prevention for Explorer Not Defined Not Defined
File Explorer: Turn off heap termination on corruption Not Defined Not Defined
File Explorer: Turn off shell protocol protected mode Not Defined Not Defined
Group Policy: Registry policy processing: Do not apply during periodic background processing Not Defined Not Defined
Group Policy: Registry policy processing: Process even if the Group Policy objects have not changed Not Defined Not Defined
Group Policy: Turn off background refresh of Group Policy Not Defined Not Defined
Interactive logon: Display user information when the session is locked User display name only Default Domain Policy
Interactive logon: Machine account lockout threshold Not Defined Not Defined
Interactive logon: Message text for users attempting to log on Configured Locally
Interactive logon: Message title for users attempting to log on Configured Locally
Interactive logon: Number of previous logons to cache (in case domain controller is not available) 10 logons Configured Locally
Interactive logon: Prompt user to change password before expiration 5 days Configured Locally
Interactive logon: Require Domain Controller authentication to unlock workstation Disabled Configured Locally
Internet Communication settings: Turn off access to the Store Not Defined Not Defined
Internet Communication Settings: Turn off downloading of print drivers over HTTP Not Defined Not Defined
Internet Communication Settings: Turn off handwriting personalization data sharing Not Defined Not Defined
Internet Communication Settings: Turn off handwriting recognition error reporting Not Defined Not Defined
Internet Communication Settings: Turn off Internet Connection Wizard if URL connection is referring to Not Defined Not Defined
Microsoft.com
Internet Communication Settings: Turn off Internet download for Web publishing and online ordering Not Defined Not Defined
wizards
Internet Communication Settings: Turn off Registration if URL connection is referring to Microsoft.com Not Defined Not Defined
Internet Communication Settings: Turn off Search Companion content file updates Not Defined Not Defined
Internet Communication Settings: Turn off the "Order Prints" picture task Not Defined Not Defined
Internet Communication Settings: Turn off the "Publish to Web" task for files and folders Not Defined Not Defined
Internet Communication Settings: Turn off the Windows Messenger Customer Experience Improvement Not Defined Not Defined
Program
Internet Communication Settings: Turn off Windows Customer Experience Improvement Program Not Defined Not Defined
Internet Communication Settings: Turn off Windows Error Reporting Not Defined Not Defined
Locale Services: Disallow copying of user input methods to the system account for sign-in Not Defined Not Defined
Location and Sensors: Turn off location Not Defined Not Defined
Logon: Do not enumerate connected users on domain-joined computers Not Defined Not Defined
Logon: Enumerate local users on domain-joined computers Not Defined Not Defined
Logon: Turn off app notifications on the lock screen Not Defined Not Defined
Microsoft network client: Digitally sign communications (always) Disabled Configured Locally
Microsoft network client: Digitally sign communications (if server agrees) Enabled Configured Locally
Microsoft network client: Send unencrypted password to connect to third-party SMB servers Disabled Configured Locally
Microsoft network server: Amount of idle time required before suspending a session 15 minutes Configured Locally
Microsoft network server: Attempt S4U2Self to obtain claim information Not Defined Not Defined
Microsoft network server: Digitally sign communications (always) Disabled Configured Locally
Microsoft network server: Digitally sign communications (if client agrees) Disabled Configured Locally
Microsoft network server: Disconnect clients when logon hours expire Enabled Configured Locally
Microsoft network server: Enable SMB version 1 protocol Not Defined Not Defined
Microsoft network server: Enable SMB version 2 protocol Not Defined Not Defined
Microsoft Support Diagnostic Tool: Turn on MSDT interactive communication with support provider Not Defined Not Defined
MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended) Disabled Configured Locally
MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) Not Defined Not Defined
MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) Not Defined Not Defined
MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes Enabled Configured Locally
MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds Not Defined Not Defined
MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except Not Defined Not Defined
from WINS servers
MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could Not Defined Not Defined
lead to DoS)
MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) Not Defined Not Defined
MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 Not Defined Not Defined
recommended)
MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted Not Defined Not Defined
MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted Not Defined Not Defined
MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a Not Defined Not Defined
warning
Network access: Allow anonymous SID/Name translation Enabled Default Domain Policy
Network access: Do not allow anonymous enumeration of SAM accounts Enabled Configured Locally
Network access: Do not allow anonymous enumeration of SAM accounts and shares Disabled Configured Locally
Network access: Do not allow storage of passwords and credentials for network authentication Disabled Configured Locally
Network access: Let Everyone permissions apply to anonymous users Disabled Configured Locally
Network access: Named pipes that can be accessed anonymously Configured Locally
Network access: Remotely accessible registry paths and subpaths System\CurrentControlSet\Control\Print\Printers Configured Locally
System\CurrentControlSet\Services\Eventlog
Software\Microsoft\OLAP Server
Software\Microsoft\Windows
Network access: Restrict anonymous access to Named Pipes and Shares Enabled Configured Locally
Network access: Restrict clients allowed to make remote calls to SAM Not Defined Not Defined
Network access: Shares that can be accessed anonymously Not Defined Not Defined
Network access: Sharing and security model for local accounts Classic - local users authenticate as themselves Configured Locally
Network security: Allow Local System to use computer identity for NTLM Not Defined Not Defined
Network security: Allow LocalSystem NULL session fallback Not Defined Not Defined
Network security: Allow PKU2U authentication requests to this computer to use online identities. Not Defined Not Defined
Network security: Configure encryption types allowed for Kerberos Not Defined Not Defined
Network security: Do not store LAN Manager hash value on next password change Enabled Configured Locally
Network security: Force logoff when logon hours expire Disabled Default Domain Policy
Network security: LAN Manager authentication level Not Defined Not Defined
Network security: LDAP client signing requirements Negotiate Signing Configured Locally
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Require 128-bit encryption Configured Locally
Network security: Minimum session security for NTLM SSP based (including secure RPC) servers Require 128-bit encryption Configured Locally
Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication Not Defined Not Defined
Network security: Restrict NTLM: Add server exceptions in this domain Not Defined Not Defined
Network security: Restrict NTLM: Audit Incoming NTLM Traffic Not Defined Not Defined
Network security: Restrict NTLM: Audit NTLM authentication in this domain Not Defined Not Defined
Network security: Restrict NTLM: Incoming NTLM traffic Not Defined Not Defined
Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers Not Defined Not Defined
Personalization: Prevent enabling lock screen camera Not Defined Not Defined
Personalization: Prevent enabling lock screen slide show Not Defined Not Defined
Prohibit connection to non-domain networks when connected to domain authenticated network Not Defined Not Defined
Prohibit installation and configuration of Network Bridge on your DNS domain network Not Defined Not Defined
Recovery console: Allow floppy copy and access to all drives and all folders Disabled Configured Locally
Remote Assistance: Allow Offer Remote Assistance Not Defined Not Defined
Remote Assistance: Allow Solicited Remote Assistance Not Defined Not Defined
Remote Procedure Call: Enable RPC Endpoint Mapper Client Authentication Not Defined Not Defined
Remote Procedure Call: Restrict Unauthenticated RPC clients Not Defined Not Defined
Require domain users to elevate when setting a network's location Not Defined Not Defined
SCM: Pass the Hash Mitigations: Apply UAC token-filtering to local accounts on network logons Not Defined Not Defined
SCM: Pass the Hash Mitigations: WDigest Authentication Not Defined Not Defined
Secure Channel: Enable SSL 3.0 (Client) Not Defined Not Defined
Secure Channel: Enable SSL 3.0 (Server) Not Defined Not Defined
Secure Channel: Enable TLS 1.0 (Client) Not Defined Not Defined
Secure Channel: Enable TLS 1.0 (Server) Not Defined Not Defined
Secure Channel: Enable TLS 1.1 (Client) Not Defined Not Defined
Secure Channel: Enable TLS 1.1 (Server) Not Defined Not Defined
Secure Channel: Enable TLS 1.2 (Client) Not Defined Not Defined
Secure Channel: Enable TLS 1.2 (Server) Not Defined Not Defined
Shutdown: Allow system to be shut down without having to log on Disabled Configured Locally
Sleep Settings: Require a password when a computer wakes (on battery) Not Defined Not Defined
System Cryptography: Force strong key protection for user keys stored on the computer Not Defined Not Defined
System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Disabled Configured Locally
System objects: Require case insensitivity for non-Windows subsystems Enabled Configured Locally
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enabled Configured Locally
System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies Disabled Configured Locally
Turn off Microsoft Peer-to-Peer Networking Services Not Defined Not Defined
User Account Control: Admin Approval Mode for the built-in Administrator account Not Defined Not Defined
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure Disabled Configured Locally
desktop
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Prompt for consent for non-Windows binaries Configured Locally
User Account Control: Behavior of the elevation prompt for standard users Prompt for credentials Configured Locally
User Account Control: Detect application installations and prompt for elevation Enabled Configured Locally
User Account Control: Only elevate executables that are signed and validated Disabled Configured Locally
User Account Control: Only elevate UIAccess applications that are installed in secure locations Enabled Configured Locally
User Account Control: Run all administrators in Admin approval mode Enabled Configured Locally
User Account Control: Switch to the secure desktop when prompting for elevation Enabled Configured Locally
User Account Control: Virtualize file and registry write failures to per-user locations Enabled Configured Locally
Windows Connect Now: Configuration of wireless settings using Windows Connect Now Not Defined Not Defined
Windows Connect Now: Prohibit access of the Windows Connect Now wizards Not Defined Not Defined
Windows Connection Manager: Minimize the number of simultaneous connections to the Internet or a Not Defined Not Defined
Windows Domain
Windows Logon Options: Sign-in last interactive user automatically after a system-initiated restart Disabled Configured Locally
45 User Rights
Enable computer and user accounts to be trusted for delegation SeEnableDelegationPrivilege Configured
Locally
Obtain an impersonation token for another user in the same session SeDelegateSessionUserImpersonatePrivilege Configured BUILTIN\Administrators
Locally
General Settings
Domain Profile
Enabled True
Public Profile
Enabled True
Enabled True
Rule Name Profile Names Protocol Local Local Ports Remote Remote
Addresses Addresses Ports
AllJoyn Router (TCP-In) Domain, Private TCP Any 9955 Any Any
AllJoyn Router (UDP-In) Domain, Private UDP Any Any Any Any
Cast to Device functionality (qWave-TCP-In) Private, Public TCP Any 2177 PlayToDevice Any
Cast to Device functionality (qWave-UDP-In) Private, Public UDP Any 2177 PlayToDevice Any
Cast to Device SSDP Discovery (UDP-In) Public UDP Any PlayToDiscovery Any Any
Cast to Device streaming server (HTTP-Streaming-In) Public TCP Any 10246 PlayToDevice Any
Cast to Device streaming server (HTTP-Streaming-In) Private TCP Any 10246 LocalSubnet Any
Cast to Device streaming server (HTTP-Streaming-In) Domain TCP Any 10246 Any Any
Cast to Device streaming server (RTCP-Streaming-In) Public UDP Any Any PlayToDevice Any
Cast to Device streaming server (RTCP-Streaming-In) Private UDP Any Any LocalSubnet Any
Cast to Device streaming server (RTCP-Streaming-In) Domain UDP Any Any Any Any
Cast to Device streaming server (RTSP-Streaming-In) Public TCP Any 23554, 23555, 23556 PlayToDevice Any
Cast to Device streaming server (RTSP-Streaming-In) Domain TCP Any 23554, 23555, 23556 Any Any
Cast to Device streaming server (RTSP-Streaming-In) Private TCP Any 23554, 23555, 23556 LocalSubnet Any
Cast to Device UPnP Events (TCP-In) Public TCP Any 2869 PlayToDevice Any
Core Networking - Destination Unreachable (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-In) Any ICMPv4 Any RPC Any Any
Core Networking - Dynamic Host Configuration Protocol (DHCP-In) Any UDP Any 68 Any 67
Core Networking - Dynamic Host Configuration Protocol for IPv6(DHCPV6-In) Any UDP Any 546 Any 547
Core Networking - Internet Group Management Protocol (IGMP-In) Any 2 Any Any Any Any
Core Networking - Multicast Listener Done (ICMPv6-In) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Query (ICMPv6-In) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Report (ICMPv6-In) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Report v2 (ICMPv6-In) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Neighbor Discovery Advertisement (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Neighbor Discovery Solicitation (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Packet Too Big (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Parameter Problem (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Router Advertisement (ICMPv6-In) Any ICMPv6 Any RPC fe80::/64 Any
Core Networking - Router Solicitation (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Teredo (UDP-In) Any UDP Any Teredo Any Any
Core Networking - Time Exceeded (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Desktop App Web Viewer Domain, Private, Public Any Any Any Any Any
Desktop App Web Viewer Domain, Private, Public Any Any Any Any Any
Desktop App Web Viewer Domain, Private, Public Any Any Any Any Any
DIAL protocol server (HTTP-In) Private TCP Any 10247 LocalSubnet Any
DIAL protocol server (HTTP-In) Domain TCP Any 10247 Any Any
File and Printer Sharing (Echo Request - ICMPv4-In) Domain ICMPv4 Any RPC Any Any
File and Printer Sharing (Echo Request - ICMPv6-In) Domain ICMPv6 Any RPC Any Any
File and Printer Sharing (NB-Datagram-In) Domain UDP Any 138 Any Any
File and Printer Sharing (NB-Name-In) Domain UDP Any 137 Any Any
File and Printer Sharing (NB-Session-In) Domain TCP Any 139 Any Any
File and Printer Sharing (SMB-In) Domain TCP Any 445 Any Any
File and Printer Sharing (Spooler Service - RPC) Domain TCP Any RPC Any Any
File and Printer Sharing (Spooler Service - RPC-EPMAP) Domain TCP Any RPCEPMap Any Any
File Server Remote Management (DCOM-In) Any TCP Any 135 Any Any
File Server Remote Management (SMB-In) Any TCP Any 445 Any Any
File Server Remote Management (WMI-In) Any TCP Any RPC Any Any
Network Discovery (WSD Events-In) Private TCP Any 5357 Any Any
Network Discovery (WSD EventsSecure-In) Private TCP Any 5358 Any Any
Remote Assistance (RA Server TCP-In) Any TCP Any Any Any Any
Remote Assistance (SSDP TCP-In) Any TCP Any 2869 LocalSubnet Any
Remote Assistance (SSDP UDP-In) Any UDP Any 1900 LocalSubnet Any
Remote Desktop - Shadow (TCP-In) Any TCP Any Any Any Any
Remote Desktop - User Mode (TCP-In) Any TCP Any 3389 Any Any
Remote Desktop - User Mode (UDP-In) Any UDP Any 3389 Any Any
SNMP Service (UDP In) Private, Public UDP Any 161 LocalSubnet Any
SNMP Service (UDP In) Domain UDP Any 161 Any Any
Web Management Service (HTTP Traffic-In) Any TCP Any 8172 Any Any
Windows Remote Management (HTTP-In) Domain, Private TCP Any 5985 Any Any
Windows Remote Management (HTTP-In) Public TCP Any 5985 LocalSubnet Any
Work or school account Domain, Private Any Any Any Any Any
Work or school account Domain, Private Any Any Any Any Any
Work or school account Domain, Private Any Any Any Any Any
Work or school account Domain, Private Any Any Any Any Any
World Wide Web Services (HTTP Traffic-In) Any TCP Any 80 Any Any
World Wide Web Services (HTTPS Traffic-In) Any TCP Any 443 Any Any
Rule Name Profile Names Protocol Local Local Remote Addresses Remote Ports
Addresses Ports
AllJoyn Router (TCP-Out) Domain, Private TCP Any Any Any Any
AllJoyn Router (UDP-Out) Domain, Private UDP Any Any Any Any
Captive Portal Flow Domain, Private, Public Any Any Any Any Any
Captive Portal Flow Domain, Private, Public Any Any Any Any Any
Captive Portal Flow Domain, Private, Public Any Any Any Any Any
Captive Portal Flow Domain, Private, Public Any Any Any Any Any
Cast to Device functionality (qWave-TCP-Out) Private, Public TCP Any Any PlayToDevice 2177
Cast to Device functionality (qWave-UDP-Out) Private, Public UDP Any Any PlayToDevice 2177
Cast to Device streaming server (RTP-Streaming-Out) Domain UDP Any Any Any Any
Cast to Device streaming server (RTP-Streaming-Out) Private UDP Any Any LocalSubnet Any
Cast to Device streaming server (RTP-Streaming-Out) Public UDP Any Any PlayToDevice Any
Connected User Experiences and Telemetry Any TCP Any Any Any 443
Core Networking - Dynamic Host Configuration Protocol (DHCP-Out) Any UDP Any 68 Any 67
Core Networking - Dynamic Host Configuration Protocol for IPv6(DHCPV6-Out) Any UDP Any 546 Any 547
Core Networking - Group Policy (LSASS-Out) Domain TCP Any Any Any Any
Core Networking - Group Policy (NP-Out) Domain TCP Any Any Any 445
Core Networking - Group Policy (TCP-Out) Domain TCP Any Any Any Any
Core Networking - Internet Group Management Protocol (IGMP-Out) Any 2 Any Any Any Any
Core Networking - IPHTTPS (TCP-Out) Any TCP Any Any Any IPHTTPSOut
Core Networking - Multicast Listener Done (ICMPv6-Out) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Query (ICMPv6-Out) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Report (ICMPv6-Out) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Report v2 (ICMPv6-Out) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Neighbor Discovery Advertisement (ICMPv6-Out) Any ICMPv6 Any RPC Any Any
Core Networking - Neighbor Discovery Solicitation (ICMPv6-Out) Any ICMPv6 Any RPC Any Any
Core Networking - Packet Too Big (ICMPv6-Out) Any ICMPv6 Any RPC Any Any
Core Networking - Parameter Problem (ICMPv6-Out) Any ICMPv6 Any RPC Any Any
Core Networking - Router Advertisement (ICMPv6-Out) Any ICMPv6 fe80::/64 RPC LocalSubnet6 Any
ff02::1
fe80::/64
Core Networking - Router Solicitation (ICMPv6-Out) Any ICMPv6 Any RPC LocalSubnet6 Any
ff02::2
fe80::/64
Core Networking - Teredo (UDP-Out) Any UDP Any Any Any Any
Core Networking - Time Exceeded (ICMPv6-Out) Any ICMPv6 Any RPC Any Any
Desktop App Web Viewer Domain, Private, Public Any Any Any Any Any
Desktop App Web Viewer Domain, Private, Public Any Any Any Any Any
Desktop App Web Viewer Domain, Private, Public Any Any Any Any Any
Email and accounts Domain, Private, Public Any Any Any Any Any
Email and accounts Domain, Private, Public Any Any Any Any Any
Email and accounts Domain, Private, Public Any Any Any Any Any
File and Printer Sharing (Echo Request - ICMPv4-Out) Domain ICMPv4 Any RPC Any Any
File and Printer Sharing (Echo Request - ICMPv6-Out) Domain ICMPv6 Any RPC Any Any
File and Printer Sharing (LLMNR-UDP-Out) Domain UDP Any Any LocalSubnet 5355
File and Printer Sharing (NB-Name-Out) Domain UDP Any Any Any 137
File and Printer Sharing (NB-Session-Out) Domain TCP Any Any Any 139
File and Printer Sharing (SMB-Out) Domain TCP Any Any Any 445
Narrator QuickStart Domain, Private, Public Any Any Any Any Any
Narrator QuickStart Domain, Private, Public Any Any Any Any Any
Narrator QuickStart Domain, Private, Public Any Any Any Any Any
Narrator QuickStart Domain, Private, Public Any Any Any Any Any
Network Discovery (Pub WSD-Out) Private UDP Any Any LocalSubnet 3702
Network Discovery (WSD Events-Out) Private TCP Any Any Any 5357
Network Discovery (WSD EventsSecure-Out) Private TCP Any Any Any 5358
Remote Assistance (PNRP-Out) Domain, Private UDP Any Any Any Any
Remote Assistance (RA Server TCP-Out) Any TCP Any Any Any Any
Remote Assistance (SSDP TCP-Out) Any TCP Any Any LocalSubnet Any
Remote Assistance (SSDP UDP-Out) Any UDP Any Any LocalSubnet 1900
Shell Input Application Domain, Private, Public Any Any Any Any Any
Shell Input Application Domain, Private, Public Any Any Any Any Any
SNMP Service (UDP Out) Private, Public UDP Any Any LocalSubnet 161
SNMP Service (UDP Out) Domain UDP Any Any Any 161
Windows Default Lock Screen Domain, Private, Public Any Any Any Any Any
Windows Default Lock Screen Domain, Private, Public Any Any Any Any Any
Windows Default Lock Screen Domain, Private, Public Any Any Any Any Any
Windows Defender SmartScreen Domain, Private, Public Any Any Any Any Any
Windows Defender SmartScreen Domain, Private, Public Any Any Any Any Any
Windows Defender SmartScreen Domain, Private, Public Any Any Any Any Any
Windows Defender SmartScreen Domain, Private, Public Any Any Any Any Any
Windows Device Management Certificate Installer (TCP out) Any TCP Any Any Any Any
Windows Device Management Enrollment Service (TCP out) Any TCP Any Any Any Any
Windows Device Management Sync Client (TCP out) Any TCP Any Any Any Any
Windows Security Domain, Private, Public Any Any Any Any Any
Windows Security Domain, Private, Public Any Any Any Any Any
Windows Security Domain, Private, Public Any Any Any Any Any
Windows Security Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Work or school account Domain, Private, Public Any Any Any Any Any
Work or school account Domain, Private, Public Any Any Any Any Any
Work or school account Domain, Private, Public Any Any Any Any Any
Your account Domain, Private, Public Any Any Any Any Any
Your account Domain, Private, Public Any Any Any Any Any
Your account Domain, Private, Public Any Any Any Any Any
Your account Domain, Private, Public Any Any Any Any Any
3 Windows Patches
The system can be configured either directly or using Group Policy, and updates can be obtained
directly from Microsoft over an internet connection or from a Windows Software Update (WSUS) Server
installed on the intranet.
General Settings
Advanced
16 History Items
20/10/2020 11:25:23 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Succeeded
1.325.1105.0)
22/10/2020 10:29:37 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Succeeded
1.325.1215.0)
23/10/2020 15:28:21 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Succeeded
1.325.1286.0)
29/10/2020 14:34:31 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Succeeded
1.325.1633.0)
07/10/2020 09:52:57 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Failed
1.325.319.0)
07/10/2020 09:37:48 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Aborted
1.325.319.0)
08/10/2020 10:25:33 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Succeeded
1.325.380.0)
08/10/2020 10:15:19 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Aborted
1.325.380.0)
08/10/2020 13:45:47 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Succeeded
1.325.384.0)
10/10/2020 23:01:15 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Succeeded
1.325.639.0)
15/10/2020 14:45:35 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Succeeded
1.325.803.0)
02/11/2020 10:35:20 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Succeeded
1.327.190.0)
15/01/2021 10:52:10 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Succeeded
1.329.2223.0)
15/01/2021 10:37:29 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version Install Aborted
1.329.2223.0)
08/10/2020 10:15:19 Update for Microsoft Defender Antivirus antimalware platform - KB4052623 (Version Install Succeeded
4.18.2009.7)
15/01/2021 10:37:29 Update for Microsoft Defender Antivirus antimalware platform - KB4052623 (Version Install Succeeded
4.18.2011.6)
Operating System
General
Installed Programs 15
Event Logs 10
Environment Variables 48
1 Files
File Details
Located True
General
Hidden False
Advanced
Encrypted False
Compressed False
Security
Owner NT AUTHORITY\SYSTEM
NTFS Permissions
NT AUTHORITY\SYSTEM False Allow Change permissions, Delete subfolders This folder only
and files, Modify, Take ownership
BUILTIN\Administrators False Allow Change permissions, Delete subfolders This folder only
and files, Modify, Take ownership
ALL APPLICATION PACKAGES False Allow Read & execute This folder only
ALL RESTRICTED APPLICATION PACKAGES False Allow Read & execute This folder only
File Contents
<configProtectedData defaultProvider="RsaProtectedConfigurationProvider">
<providers>
<add name="RsaProtectedConfigurationProvider"
type="System.Configuration.RsaProtectedConfigurationProvider,System.Configuration, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a"
description="Uses RsaCryptoServiceProvider to encrypt and decrypt"
keyContainerName="NetFrameworkConfigurationKey"
cspProviderName=""
useMachineContainer="true"
useOAEP="false" />
<add name="DataProtectionConfigurationProvider"
type="System.Configuration.DpapiProtectedConfigurationProvider,System.Configuration, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a"
description="Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt"
useMachineProtection="true"
keyEntropy="" />
</providers>
</configProtectedData>
<runtime />
<connectionStrings>
<add name="LocalSqlServer" connectionString="data source=.\SQLEXPRESS;Integrated
Security=SSPI;AttachDBFilename=|DataDirectory|aspnetdb.mdf;User Instance=true" providerName="System.Data.SqlClient"/>
</connectionStrings>
<system.data>
<DbProviderFactories />
</system.data>
<system.serviceModel>
<extensions>
<behaviorExtensions>
<add name="persistenceProvider" type="System.ServiceModel.Configuration.PersistenceProviderElement,
System.WorkflowServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"/>
<add name="workflowRuntime" type="System.ServiceModel.Configuration.WorkflowRuntimeElement,
System.WorkflowServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"/>
<add name="enableWebScript" type="System.ServiceModel.Configuration.WebScriptEnablingElement,
System.ServiceModel.Web, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"/>
<add name="webHttp" type="System.ServiceModel.Configuration.WebHttpElement, System.ServiceModel.Web,
Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"/>
<add name="serviceDiscovery" type="System.ServiceModel.Discovery.Configuration.ServiceDiscoveryElement,
System.ServiceModel.Discovery, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />
<add name="endpointDiscovery" type="System.ServiceModel.Discovery.Configuration.EndpointDiscoveryElement,
System.ServiceModel.Discovery, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />
<add name="etwTracking" type="System.ServiceModel.Activities.Configuration.EtwTrackingBehaviorElement,
System.ServiceModel.Activities, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />
<add name="routing" type="System.ServiceModel.Routing.Configuration.RoutingExtensionElement,
System.ServiceModel.Routing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />
<add name="soapProcessing" type="System.ServiceModel.Routing.Configuration.SoapProcessingExtensionElement,
System.ServiceModel.Routing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />
<add name="workflowIdle" type="System.ServiceModel.Activities.Configuration.WorkflowIdleElement,
System.ServiceModel.Activities, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />
<add name="workflowUnhandledException"
type="System.ServiceModel.Activities.Configuration.WorkflowUnhandledExceptionElement, System.ServiceModel.Activities,
Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />
<httpHandlers />
<membership>
<providers>
<add name="AspNetSqlMembershipProvider"
type="System.Web.Security.SqlMembershipProvider, System.Web, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a"
connectionStringName="LocalSqlServer"
enablePasswordRetrieval="false"
enablePasswordReset="true"
requiresQuestionAndAnswer="true"
applicationName="/"
requiresUniqueEmail="false"
passwordFormat="Hashed"
maxInvalidPasswordAttempts="5"
minRequiredPasswordLength="7"
minRequiredNonalphanumericCharacters="1"
passwordAttemptWindow="10"
passwordStrengthRegularExpression="" />
</providers>
</membership>
<profile>
<providers>
<add name="AspNetSqlProfileProvider" connectionStringName="LocalSqlServer" applicationName="/"
type="System.Web.Profile.SqlProfileProvider, System.Web, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</profile>
<roleManager>
<providers>
<add name="AspNetSqlRoleProvider" connectionStringName="LocalSqlServer" applicationName="/"
type="System.Web.Security.SqlRoleProvider, System.Web, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a" />
<add name="AspNetWindowsTokenRoleProvider" applicationName="/"
type="System.Web.Security.WindowsTokenRoleProvider, System.Web, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</roleManager>
</system.web>
</configuration>
The Event Log Service records application, security, and system events which can be viewed with Event
Viewer. This can help identify and diagnose and predict system problems.
10 Event Logs
Key Management Service 20,480KB Overwrite events as needed (oldest events first)
System 20,480KB Archive the log when full, do not overwrite events
Name Application
Filename C:\Windows\System32\Winevt\Logs\Application.evtx
Retention
8198 Error Software Protection Platform Service License Activation (slui.exe) failed with the
following error code:
hr=0x87E10BC6
Command-line arguments:
RuleId=31e71c49-8da7-4a2f-ad92-45d98a
1c79ba;Action=AutoActivate;AppId=55c92
734-d682-4d71-983e-d6ec3f16059f;SkuId
=175a4401-9571-44e3-b7ed-1418ac983e
2b;NotificationInterval=1440;Trigger=Time
rEvent
1003 Information Software Protection Platform Service The Software Protection service has
completed licensing status check.
Application Id=55c92734-d682-4d71-983e-
d6ec3f16059f
Licensing Status=
1: 1124ad22-3737-4c21-bfab-ae36a53238
28, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
2: 175a4401-9571-44e3-b7ed-1418ac983
e2b, 1, 1 [(0 )(1 )(2 [0xC004E003, 0, 0], [(
1 0xC004F034)( 1 0xC004F034)(?)(?)(?)(?
)(?)(?)])(3 [0x00000000, 0, 0], [( 6
0xC004F009 0 0)( 1 0x00000000)( 6
0xC004F009 0 0)(?)(?)(?)( 10 0x00000000
msft:rm/algorithm/flags/1.0)( 11
0x00000000 0xC004F034)])]
3: 2e7a9ad1-a849-4b56-babe-17d5a29fe4
b4, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
4: 34e1ae55-27f8-4950-8877-7a03be5fb1
81, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
5: 44aba848-245e-4e1a-ac42-1def36871f
8198 Error Software Protection Platform Service License Activation (slui.exe) failed with the
following error code:
hr=0x87E10BC6
Command-line arguments:
RuleId=31e71c49-8da7-4a2f-ad92-45d98a
1c79ba;Action=AutoActivate;AppId=55c92
734-d682-4d71-983e-d6ec3f16059f;SkuId
=175a4401-9571-44e3-b7ed-1418ac983e
2b;NotificationInterval=1440;Trigger=Netw
orkAvailable
1003 Information Software Protection Platform Service The Software Protection service has
completed licensing status check.
Application Id=55c92734-d682-4d71-983e-
d6ec3f16059f
Licensing Status=
1: 1124ad22-3737-4c21-bfab-ae36a53238
28, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
2: 175a4401-9571-44e3-b7ed-1418ac983
e2b, 1, 1 [(0 )(1 )(2 [0xC004E003, 0, 0], [(
1 0xC004F034)( 1 0xC004F034)(?)(?)(?)(?
)(?)(?)])(3 [0x00000000, 0, 0], [( 6
0xC004F009 0 0)( 1 0x00000000)( 6
0xC004F009 0 0)(?)(?)(?)( 10 0x00000000
msft:rm/algorithm/flags/1.0)( 11
0x00000000 0xC004F034)])]
3: 2e7a9ad1-a849-4b56-babe-17d5a29fe4
b4, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
4: 34e1ae55-27f8-4950-8877-7a03be5fb1
81, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
5: 44aba848-245e-4e1a-ac42-1def36871f
95, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
6: 7305f85e-3cc0-4168-807e-af0afae1f51f
, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
7: 7c815a7a-6d68-4369-9cfa-c3671c8d1a
3f, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
8: 864fa973-9c03-4e02-81d2-87fd17bc0b
8c, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
9: 950d5c80-3a8b-4c7a-991b-6487e045d
bc3, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
10: 9db83b52-9904-4326-8957-ebe6feedf
37c, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
11: c28b8385-97ea-4fb1-acae-57fa346e6
158, 1, 0 [(0 [0xC004F014, 0, 0],
1003 Information Software Protection Platform Service The Software Protection service has
completed licensing status check.
Application Id=55c92734-d682-4d71-983e-
d6ec3f16059f
Licensing Status=
1: 1124ad22-3737-4c21-bfab-ae36a53238
28, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
2: 175a4401-9571-44e3-b7ed-1418ac983
e2b, 1, 1 [(0 )(1 )(2 [0xC004E003, 0, 0], [(
1 0xC004F034)( 1 0xC004F034)(?)(?)(?)(?
)(?)(?)])(3 [0x00000000, 0, 0], [( 6
0xC004F009 0 0)( 1 0x00000000)( 6
0xC004F009 0 0)(?)(?)(?)( 10 0x00000000
msft:rm/algorithm/flags/1.0)( 11
0x00000000 0xC004F034)])]
3: 2e7a9ad1-a849-4b56-babe-17d5a29fe4
b4, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
4: 34e1ae55-27f8-4950-8877-7a03be5fb1
81, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
5: 44aba848-245e-4e1a-ac42-1def36871f
95, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
6: 7305f85e-3cc0-4168-807e-af0afae1f51f
, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
7: 7c815a7a-6d68-4369-9cfa-c3671c8d1a
3f, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
8: 864fa973-9c03-4e02-81d2-87fd17bc0b
8c, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
9: 950d5c80-3a8b-4c7a-991b-6487e045d
bc3, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
10: 9db83b52-9904-4326-8957-ebe6feedf
37c, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
11: c28b8385-97ea-4fb1-acae-57fa346e6
158, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
12: ceae6266-8034-48db-92e4-fc94eb117
42f, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
13: d8966f28-347f-4d92-8912-1e57d3572
00b, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
1003 Information Software Protection Platform Service The Software Protection service has
completed licensing status check.
Application Id=55c92734-d682-4d71-983e-
d6ec3f16059f
Licensing Status=
1: 1124ad22-3737-4c21-bfab-ae36a53238
28, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
2: 175a4401-9571-44e3-b7ed-1418ac983
e2b, 1, 1 [(0 )(1 )(2 [0xC004E003, 0, 0], [(
1 0xC004F034)( 1 0xC004F034)(?)(?)(?)(?
)(?)(?)])(3 [0x00000000, 0, 0], [( 6
0xC004F009 0 0)( 1 0x00000000)( 6
0xC004F009 0 0)(?)(?)(?)( 10 0x00000000
msft:rm/algorithm/flags/1.0)( 11
0x00000000 0xC004F034)])]
3: 2e7a9ad1-a849-4b56-babe-17d5a29fe4
b4, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
4: 34e1ae55-27f8-4950-8877-7a03be5fb1
81, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)(?)(?)])(1 )(2 )(3 )]
16394 Information Software Protection Platform Service Offline downlevel migration succeeded.
Name HardwareEvents
Filename C:\Windows\System32\Winevt\Logs\HardwareEvents.evtx
File Size 68
Number Of Records 0
Retention
File Size 68
Number Of Records 0
Retention
File Size 68
Number Of Records 0
Retention
Name Parameters
Filename C:\Windows\System32\Winevt\Logs\Parameters.evtx
File Size 68
Number Of Records 0
Retention
Name Security
Filename C:\Windows\System32\Winevt\Logs\Security.evtx
Retention
Subject:
Security ID: S-1-5-18
Account Name: XCS-2K19-LIVE$
Account Domain: TEST2019
Logon ID: 0x3e7
Process Information:
Process ID: 0xaec
Name: C:\Program
Files\VMware\VMware Tools\vmtoolsd.exe
Subject:
Security ID: S-1-5-19
Account Name: LOCAL SERVICE
Account Domain: NT AUTHORITY
Logon ID: 0x3e5
Process Information:
Process ID: 0x428
Name: C:\Windows\System32\svchost.ex
e
Subject:
Security ID: S-1-5-18
Account Name: XCS-2K19-LIVE$
Account Domain: TEST2019
Logon ID: 0x3e7
Process Information:
Process ID: 0xaec
Name: C:\Program
Files\VMware\VMware Tools\vmtoolsd.exe
Subject:
Security ID: S-1-5-19
Account Name: LOCAL SERVICE
Account Domain: NT AUTHORITY
Logon ID: 0x3e5
Process Information:
Process ID: 0x428
Name: C:\Windows\System32\svchost.ex
e
Subject:
Security ID: S-1-5-19
Account Name: LOCAL SERVICE
Account Domain: NT AUTHORITY
Logon ID: 0x3e5
Process Information:
Process ID: 0x428
Name: C:\Windows\System32\svchost.ex
e
Group:
Security ID: S-1-5-32-551
Group Name: Backup Operators
Group Domain: Builtin
Process Information:
Process ID: 0x6cc
Process Name: C:\Windows\System32\s
vchost.exe
Subject:
Security ID: S-1-5-18
Account Name: XCS-2K19-LIVE$
Account Domain: TEST2019
Logon ID: 0x3e7
Group:
Security ID: S-1-5-32-544
Group Name: Administrators
Group Domain: Builtin
Process Information:
Process ID: 0x6cc
Process Name: C:\Windows\System32\s
vchost.exe
Subject:
Security ID: S-1-5-21-1597374802-18346
2725-2612050851-1103
Account Name: sysadmin
Account Domain: TEST2019
Logon ID: 0x570d2
Additional Information:
Caller Workstation: XCS-2K19-LIVE
Target Account Name:
WDAGUtilityAccount
Target Account Domain: XCS-2K19-LIVE
Subject:
Security ID: S-1-5-21-1597374802-18346
2725-2612050851-1103
Account Name: sysadmin
Account Domain: TEST2019
Logon ID: 0x570d2
Additional Information:
Caller Workstation: XCS-2K19-LIVE
Target Account Name: Guest
Target Account Domain: XCS-2K19-LIVE
Subject:
Security ID: S-1-5-21-1597374802-18346
2725-2612050851-1103
Account Name: sysadmin
Account Domain: TEST2019
Logon ID: 0x570d2
Name State
Filename C:\Windows\System32\Winevt\Logs\State.evtx
File Size 68
Number Of Records 0
Retention
Name System
Filename C:\Windows\System32\Winevt\Logs\System.evtx
Retention
Retention Policy Archive the log when full, do not overwrite events
52 Warning Microsoft-Windows-Time-Service The time service has set the time with
offset 140773 seconds.
7036 Information Service Control Manager The Microsoft Account Sign-in Assistant
service entered the stopped state.
7040 Information Service Control Manager The start type of the Background
Intelligent Transfer Service service was
changed from auto start to demand start.
File Size 68
Number Of Records 11
Retention
ID=5
Printer name=HP Officejet 5740 series
(Network)
Driver=HP Officejet 5740 series
Class=
Type=0
Default=1
ID=2
Printer name=Microsoft XPS Document
Writer
Driver=Microsoft XPS Document Writer
v4
Class=
Type=0
Default=0
ID=4
Printer name=Fax
Driver=Microsoft Shared Fax Driver
Class=
Type=0
Default=0
ID=1
ID=6
Printer name=Fax - HP Officejet 5740
series (Network)
Driver=Fax - HP Officejet 5740 series
Class=
Type=0
Default=0
ID=3
Printer name=Microsoft Print to PDF
Driver=Microsoft Print To PDF
Class=
Type=0
Default=0
'
ID=5
Printer name=HP Officejet 5740 series
(Network)
Driver=HP Officejet 5740 series
Class=
Type=0
Default=1
ID=2
Printer name=Microsoft XPS Document
Writer
Driver=Microsoft XPS Document Writer
v4
Class=
Type=0
Default=0
ID=4
Printer name=Fax
Driver=Microsoft Shared Fax Driver
Class=
Type=0
Default=0
ID=1
Printer name=Send To OneNote 2016
Driver=Send to Microsoft OneNote 16
Driver
Class=
Type=0
Default=0
ID=6
Printer name=Fax - HP Officejet 5740
series (Network)
Driver=Fax - HP Officejet 5740 series
Class=
Type=0
Default=0
'
ID=5
Printer name=HP Officejet 5740 series
(Network)
Driver=HP Officejet 5740 series
Class=
Type=0
Default=1
ID=2
Printer name=Microsoft XPS Document
Writer
Driver=Microsoft XPS Document Writer
v4
Class=
Type=0
Default=0
ID=4
Printer name=Fax
Driver=Microsoft Shared Fax Driver
Class=
Type=0
Default=0
ID=1
Printer name=Send To OneNote 2016
Driver=Send to Microsoft OneNote 16
Driver
Class=
Type=0
Default=0
ID=6
Printer name=Fax - HP Officejet 5740
series (Network)
Driver=Fax - HP Officejet 5740 series
Class=
Type=0
Default=0
ID=3
Printer name=Microsoft Print to PDF
Driver=Microsoft Print To PDF
Class=
Type=0
Default=0
'
ID=5
Printer name=HP Officejet 5740 series
(Network)
Driver=HP Officejet 5740 series
Class=
Type=0
Default=1
ID=2
Printer name=Microsoft XPS Document
Writer
Driver=Microsoft XPS Document Writer
v4
Class=
Type=0
Default=0
ID=4
Printer name=Fax
Driver=Microsoft Shared Fax Driver
Class=
Type=0
Default=0
ID=1
Printer name=Send To OneNote 2016
Driver=Send to Microsoft OneNote 16
Driver
Class=
Type=0
Default=0
ID=6
Printer name=Fax - HP Officejet 5740
series (Network)
Driver=Fax - HP Officejet 5740 series
Class=
Type=0
Default=0
ID=3
Printer name=Microsoft Print to PDF
Driver=Microsoft Print To PDF
Class=
Type=0
Default=0
'
ID=5
Printer name=HP Officejet 5740 series
(Network)
Driver=HP Officejet 5740 series
Class=
Type=0
Default=1
ID=2
Printer name=Microsoft XPS Document
Writer
Driver=Microsoft XPS Document Writer
v4
Class=
Type=0
Default=0
ID=4
Printer name=Fax
Driver=Microsoft Shared Fax Driver
Class=
Type=0
Default=0
ID=1
Printer name=Send To OneNote 2016
Driver=Send to Microsoft OneNote 16
Driver
Class=
Type=0
Default=0
ID=6
Printer name=Fax - HP Officejet 5740
series (Network)
Driver=Fax - HP Officejet 5740 series
Class=
Type=0
Default=0
ID=3
Printer name=Microsoft Print to PDF
Driver=Microsoft Print To PDF
Class=
Type=0
Default=0
'
ID=2
Printer name=Microsoft XPS Document
Writer
Driver=Microsoft XPS Document Writer
v4
Class=
Type=0
Default=0
ID=4
Printer name=Fax
Driver=Microsoft Shared Fax Driver
Class=
Type=0
Default=0
ID=1
Printer name=Send To OneNote 2016
Driver=Send to Microsoft OneNote 16
Driver
Class=
Type=0
Default=0
ID=6
Printer name=Fax - HP Officejet 5740
series (Network)
Driver=Fax - HP Officejet 5740 series
Class=
Type=0
Default=0
ID=3
Printer name=Microsoft Print to PDF
Driver=Microsoft Print To PDF
Class=
Type=0
Default=0
'
ID=5
Printer name=HP Officejet 5740 series
(Network)
Driver=HP Officejet 5740 series
Class=
Type=0
Default=1
ID=2
Printer name=Microsoft XPS Document
Writer
Driver=Microsoft XPS Document Writer
v4
Class=
Type=0
ID=4
Printer name=Fax
Driver=Microsoft Shared Fax Driver
Class=
Type=0
Default=0
ID=1
Printer name=Send To OneNote 2016
Driver=Send to Microsoft OneNote 16
Driver
Class=
Type=0
Default=0
ID=6
Printer name=Fax - HP Officejet 5740
series (Network)
Driver=Fax - HP Officejet 5740 series
Class=
Type=0
Default=0
ID=3
Printer name=Microsoft Print to PDF
Driver=Microsoft Print To PDF
Class=
Type=0
Default=0
'
Retention
Context Information:
DetailSequence=1
DetailTotal=1
SequenceNumber=19
UserId=TEST2019\sysadmin
HostName=Default Host
HostVersion=5.1.17763.134
HostId=969cac80-b142-4b44-8023-1c185b
977703
HostApplication=C:\Program
Files\CENTREL Solutions\XIA
Configuration\XIA Configuration Service\CE
NTREL.XIA.Configuration.Service.exe
EngineVersion=5.1.17763.134
RunspaceId=adbf0ea9-e1a4-4b90-b21e-f1
fd413403a3
PipelineId=3
ScriptName=
CommandLine=else { $result = Add-Type
-TypeDefinition $securitySupportCoreSourc
e}
Details:
CommandInvocation(Add-Type):
"Add-Type"
ParameterBinding(Add-Type):
name="TypeDefinition"; value="using
System;
using System.Runtime.InteropServices;
using System.Security.Principal;
using System.Text;
namespace CENTREL.XIA.Network.Manag
ement.Windows.SecuritySupportCore
{
/// <summary>
/// Provides security support functions.
/// </summary>
public class SecuritySupportCore
{
/// <summary>
/// Obtains the security identifier of the
account name on the specified remote
machine.
/// </summary>
/// <param name="machineName">Th
e name of the remote system on which to
perform the resolution.</param>
/// <param name="accountName">The
name of the account to resolve in the
format "domain\username".</param>
/// <returns>The security identifier on
the remote machine in SDDL
format.</returns>
public static String
GetAccountSid(String machineName,
String accountName)
{
IntPtr sidPtr = IntPtr.Zero;
try
{
int ERROR_INSUFFICIENT_BUF
}
}
"
Details:
NewEngineState=Available
PreviousEngineState=None
SequenceNumber=17
HostName=Default Host
HostVersion=5.1.17763.134
HostId=969cac80-b142-4b44-8023-1c185b
977703
HostApplication=C:\Program
Files\CENTREL Solutions\XIA
Configuration\XIA Configuration Service\CE
NTREL.XIA.Configuration.Service.exe
EngineVersion=5.1.17763.134
RunspaceId=adbf0ea9-e1a4-4b90-b21e-f1
fd413403a3
PipelineId=
CommandName=
CommandType=
ScriptName=
CommandPath=
CommandLine=
SequenceNumber=15
HostName=Default Host
HostVersion=5.1.17763.134
HostId=969cac80-b142-4b44-8023-1c185b
977703
HostApplication=C:\Program
Files\CENTREL Solutions\XIA
Configuration\XIA Configuration Service\CE
NTREL.XIA.Configuration.Service.exe
EngineVersion=
RunspaceId=
PipelineId=
CommandName=
CommandType=
ScriptName=
CommandPath=
CommandLine=
Details:
ProviderName=Certificate
NewProviderState=Started
SequenceNumber=13
HostName=Default Host
HostVersion=5.1.17763.134
HostId=969cac80-b142-4b44-8023-1c185b
977703
HostApplication=C:\Program
Files\CENTREL Solutions\XIA
Configuration\XIA Configuration Service\CE
NTREL.XIA.Configuration.Service.exe
EngineVersion=
RunspaceId=
PipelineId=
CommandName=
CommandType=
ScriptName=
CommandPath=
CommandLine=
Details:
ProviderName=Variable
NewProviderState=Started
SequenceNumber=11
HostName=Default Host
HostVersion=5.1.17763.134
HostId=969cac80-b142-4b44-8023-1c185b
977703
HostApplication=C:\Program
Files\CENTREL Solutions\XIA
Configuration\XIA Configuration Service\CE
NTREL.XIA.Configuration.Service.exe
EngineVersion=
RunspaceId=
PipelineId=
CommandName=
CommandType=
ScriptName=
CommandPath=
CommandLine=
Details:
ProviderName=Function
NewProviderState=Started
HostName=Default Host
HostVersion=5.1.17763.134
HostId=969cac80-b142-4b44-8023-1c185b
977703
HostApplication=C:\Program
Files\CENTREL Solutions\XIA
Configuration\XIA Configuration Service\CE
NTREL.XIA.Configuration.Service.exe
EngineVersion=
RunspaceId=
PipelineId=
CommandName=
CommandType=
ScriptName=
CommandPath=
CommandLine=
Details:
ProviderName=FileSystem
NewProviderState=Started
SequenceNumber=7
HostName=Default Host
HostVersion=5.1.17763.134
HostId=969cac80-b142-4b44-8023-1c185b
977703
HostApplication=C:\Program
Files\CENTREL Solutions\XIA
Configuration\XIA Configuration Service\CE
NTREL.XIA.Configuration.Service.exe
EngineVersion=
RunspaceId=
PipelineId=
CommandName=
CommandType=
ScriptName=
CommandPath=
CommandLine=
Details:
ProviderName=Environment
NewProviderState=Started
SequenceNumber=5
HostName=Default Host
HostVersion=5.1.17763.134
HostId=969cac80-b142-4b44-8023-1c185b
977703
HostApplication=C:\Program
Files\CENTREL Solutions\XIA
Configuration\XIA Configuration Service\CE
NTREL.XIA.Configuration.Service.exe
EngineVersion=
RunspaceId=
PipelineId=
CommandName=
CommandType=
ScriptName=
CommandPath=
CommandLine=
Details:
ProviderName=Alias
NewProviderState=Started
SequenceNumber=3
HostName=Default Host
HostVersion=5.1.17763.134
HostId=969cac80-b142-4b44-8023-1c185b
Details:
ProviderName=Registry
NewProviderState=Started
SequenceNumber=1
HostName=Default Host
HostVersion=5.1.17763.134
HostId=969cac80-b142-4b44-8023-1c185b
977703
HostApplication=C:\Program
Files\CENTREL Solutions\XIA
Configuration\XIA Configuration Service\CE
NTREL.XIA.Configuration.Service.exe
EngineVersion=
RunspaceId=
PipelineId=
CommandName=
CommandType=
ScriptName=
CommandPath=
CommandLine=
48 Environment Variables
%NUMBER_OF_PROCESSORS% <SYSTEM> 4
%PROCESSOR_LEVEL% <SYSTEM> 6
%SystemDrive% <SYSTEM> C:
%TEMP% NT %USERPROFILE%\AppData\Local\Temp
SERVICE\SQLTELEMETRY$SQLEXPRESS
%TMP% NT %USERPROFILE%\AppData\Local\Temp
SERVICE\SQLTELEMETRY$SQLEXPRESS
15 Installed Programs
Browser for SQL Server 2019 Microsoft Corporation 32 bit 15.0.2000.5 08 June 2020
Local Administrator Password Solution Microsoft Corporation 64 bit 6.2.0.0 15 October 2020
Microsoft ODBC Driver 17 for SQL Server Microsoft Corporation 64 bit 17.4.0.1 08 June 2020
Microsoft OLE DB Driver for SQL Server Microsoft Corporation 64 bit 18.2.3.0 08 June 2020
Microsoft SQL Server 2012 Native Client Microsoft Corporation 64 bit 11.4.7462.6 08 June 2020
Microsoft SQL Server 2019 (64-bit) Microsoft Corporation 64 bit 08 June 2020
Microsoft SQL Server 2019 Setup (English) Microsoft Corporation 64 bit 15.0.4013.40 08 June 2020
Microsoft SQL Server 2019 T-SQL Language Service Microsoft Corporation 64 bit 15.0.2000.5 08 June 2020
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 Microsoft Corporation 64 bit 9.0.30729.6161 04 October 2018
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 Microsoft Corporation 32 bit 9.0.30729.4148 04 October 2018
Microsoft Visual C++ 2017 Redistributable (x64) - 14.14.26429 Microsoft Corporation 32 bit 14.14.26429.4 08 June 2020
Microsoft Visual C++ 2017 Redistributable (x86) - 14.14.26429 Microsoft Corporation 32 bit 14.14.26429.4 08 June 2020
Microsoft VSS Writer for SQL Server 2019 Microsoft Corporation 64 bit 15.0.2000.5 08 June 2020
Internet Settings
System Proxy
Administrators False
Users False
Drivers 23
Data Sources 1
23 ODBC Drivers
Driver da Microsoft para arquivos texto (*.txt; *.csv) x86 2.50 odbcjt32.dll
SQL Server Native Client RDA 11.0 x64 3.80 2011.110.5069.66 sqlnclirda11.dll
SQL Server Data Source x64 SQL Server This is a SQL Server data source.
General Settings
Driver C:\Windows\system32\SQLSRV32.dll
Platform x64
SQL Server
Server XCS-2K19-LIVE
Database master
Database Filename
Encrypt True
Language us_english
3 Properties
Name Value
LastUser sysadmin
QueryLog_On Yes
StatsLog_On Yes
Operating System
General
Version 10.0.17763
Country Code 44
Locale 0809
Domain test2019.net
Timezone
Registry
Page Files
PowerShell Settings
Is Installed True
Permissions
Audit Rules
1 Registry Keys
1 Registry Values
Registry Key
Located True
Hive HKEY_LOCAL_MACHINE
9 Values
Security
Permissions
Audit Rules
Registry Value
Located True
Value 11.134.17763.0
Feature
HTTP Activation
Non-HTTP Activation
ASP.NET 4.7
WCF Services
HTTP Activation
TCP Activation
Certification Authority
Online Responder
Compact Server
BranchCache
DHCP Server
Direct Play
DNS Server
Enhanced Storage
Failover Clustering
Fax Server
Data Deduplication
DFS Namespaces
DFS Replication
File Server
Work Folders
Storage Services
Hyper-V
Media Foundation
Message Queuing
HTTP Support
Multicasting Support
Routing Service
Multipath I/O
MultiPoint Connector
Network Controller
Network Virtualization
Internet Printing
LPD Service
Print Server
Remote Access
Routing
Remote Assistance
Shielded VM Tools
SNMP Tools
AD DS Tools
SMTP Server
SNMP Service
Storage Replica
System Insights
Telnet Client
TFTP Client
FTP Server
FTP Extensibility
FTP Service
Management Tools
Management Service
Web Server
Application Development
Application Initialization
ASP
ASP.NET 3.5
ASP.NET 4.7
CGI
ISAPI Extensions
ISAPI Filters
WebSocket Protocol
Default Document
Directory Browsing
HTTP Errors
HTTP Redirection
Static Content
WebDAV Publishing
Custom Logging
HTTP Logging
Logging Tools
ODBC Logging
Request Monitor
Tracing
Performance
Security
Basic Authentication
Digest Authentication
Request Filtering
Windows Authentication
WebDAV Redirector
Deployment Server
Transport Server
Windows PowerShell
Configuration APIs
Process Model
WID Connectivity
WSUS Services
WINS Server
WoW64 Support
XPS Viewer
bginfo
User Public
SecurityHealth
Command %windir%\system32\SecurityHealthSystray.exe
Location HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
User Public
Location HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
User Public
AD RMS Rights Policy Template Management (Automated) Multiple triggers defined Everyone
AD RMS Rights Policy Template Management (Manual) At log on of any user Everyone
Service Settings
IPv4 Filter *
IPv6 Filter *
Started True
Version 10.0.17763.1
Listener Listener_1084132640
Enabled True
Address *
Port 5985
Protocol HTTP
Client Settings
Trusted Hosts
CaptureService_58703 Manual
Connected Devices Platform Service Automatic (Delayed Start, Trigger Start) NT AUTHORITY\LocalService
ConsentUX_58703 Manual
Device Management Wireless Application Protocol (WAP) Push message Routing Service Disabled LocalSystem
DevicePicker_58703 Disabled
DevicesFlow_58703 Manual
PrintWorkflow_58703 Manual
Touch Keyboard and Handwriting Panel Service Manual (Trigger Start) LocalSystem
Active Directory
Service Information
Global Settings
MaxNegPhaseCorrection 4,294,967,295
MaxPosPhaseCorrection 4,294,967,295
Client Settings
Enabled True
Server Settings
Enabled False
2 Support Provisions
Hardware Warranty Hardware Maintenance 9-5pm Mon-Fri 04 October 2018 04 October 2023
Relationship Information
Validity Period
Relationship Information
Validity Period
22 versions
1.20 DEMO2012R2\sysadmin 19 January 2021 16:33 Updated by XIA Configuration Client Data
1.18 DEMO2012R2\sysadmin 29 October 2020 14:49 Updated by XIA Configuration Client Data
1.15 DEMO2012R2\sysadmin 23 October 2020 17:53 Updated by XIA Configuration Client Data
1.14 DEMO2012R2\sysadmin 23 October 2020 17:48 Updated by XIA Configuration Client Data
1.13 DEMO2012R2\sysadmin 23 October 2020 17:41 Updated by XIA Configuration Client Data
1.12 DEMO2012R2\sysadmin 23 October 2020 16:40 Updated by XIA Configuration Client Data
1.11 DEMO2012R2\sysadmin 23 October 2020 16:25 Updated by XIA Configuration Client Data
1.10 DEMO2012R2\sysadmin 22 October 2020 11:30 Updated by XIA Configuration Client Data
1.09 DEMO2012R2\sysadmin 20 October 2020 12:29 Updated by XIA Configuration Client Data
1.08 DEMO2012R2\sysadmin 20 October 2020 12:20 Updated by XIA Configuration Client Data
1.07 DEMO2012R2\sysadmin 16 October 2020 14:48 Updated by XIA Configuration Client Data
1.06 DEMO2012R2\sysadmin 15 October 2020 16:25 Updated by XIA Configuration Client Data
1.05 DEMO2012R2\sysadmin 15 October 2020 16:11 Updated by XIA Configuration Client Data
1.04 DEMO2012R2\sysadmin 15 October 2020 16:05 Updated by XIA Configuration Client Data
1.03 DEMO2012R2\sysadmin 15 October 2020 15:53 Updated by XIA Configuration Client Data
1.02 DEMO2012R2\sysadmin 12 October 2020 13:47 Updated by XIA Configuration Client Data
1.01 DEMO2012R2\sysadmin 09 October 2020 11:16 Updated by XIA Configuration Client Data