Windows Machine Report
Windows Machine Report
XCS-2K22
Author TEST2022\sysadmin
Version 1.01
Disclaimer 7
Client Information 9
Relationships 10
Relationship Map 11
Management Summary 12
Compliance Benchmarks 13
Location 29
Hardware 30
BIOS Information 31
Disk Drives 33
Disk Shelves 37
Disk Shelf 01 38
Volumes 39
C: 40
E: (ReFS Volume) 41
Devices 44
Physical Memory 47
Printers 48
Processors 51
Tape Libraries 54
Tape Library 1 55
Video Controllers 56
Networking 57
Hosts File 58
Network Adapters 60
Ethernet0 61
Remote Assistance 66
Remote Desktop 67
SNMP Configuration 68
Shares 69
ADMIN$ 70
C$ 71
E$ 72
IPC$ 73
Shared Folder 74
Security 75
Audit Policy 79
Certificate Stores 80
Personal 81
WMSvc-SHA2-XCS-2K22 82
Web Hosting 83
Local Account Policies 84
LAPS Settings 85
Local Users 86
Administrator 87
DefaultAccount 88
Guest 89
WDAGUtilityAccount 90
Local Groups 91
Microsoft Defender 95
Security Options 96
Software 125
Application 136
Security 146
Setup 148
System 150
Registry 165
GoogleUpdateTaskMachineCore{722D3B95-1358-4B6A-B6EA-1BA14905F9D7} 178
GoogleUpdateTaskMachineUA{B5FB06C2-DBE0-4D16-A4FB-4073AED798C6} 180
MicrosoftEdgeUpdateTaskMachineCore 182
MicrosoftEdgeUpdateTaskMachineUA 184
Microsoft, Windows and Active Directory are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
General Information
Name XCS-2K22
System Information
Item ID 1026
Version ID 1.01
ProLiant DL360 G4
Item Identifiers
Tertiary Identifier
Environment Identifier
Client Information
Scan Profile
Target XCS-2K22
8 Relationships
Operating System
Domain test2022.net
Hardware Information
Manufacturer HP
Networking
Server Functions
2.01 Set the "Account lockout duration" to 30 minutes or longer Not Applicable
2.02 Set the "Account lockout threshold" to greater than 4 and less than 10 0
2.03 Set the "Reset account lockout after" value to between 15 minutes and 30 minutes Not Applicable
3.01 Set "Allow Basic Authentication" to "False" for the WinRM Client True
3.02 Set "Allow Digest Authentication" to "False" for the WinRM Client True
3.03 Set "Allow Unencrypted Traffic" to "False" for the WinRM Client False
3.04 Set "Allow Basic Authentication" to "False" for the WinRM Service False
3.05 Set "Allow Unencrypted Traffic" to "False" for the WinRM Service False
3.06 Set "Disallow Storing RunAs Credentials" to "True" for the WinRM Service False
3.07 Set "Allow Remote Shell Access" to "True" for the Windows Remote Shell True
4.01 Rename the local Administrator account to a less easily identifiable account name Administrator
(does not apply to domain controllers)
4.02 Set the local Administrator account to "Disabled" (does not apply to domain Enabled
controllers)
4.03 Rename the local Guest account to a less easily identifiable account name (does not Guest
4.04 Set the local Guest account to "Disabled" (does not apply to domain controllers) True
5.01 Limit the number of server functions to one per server IIS Web Server
SQL Instance [SQLEXPRESS]
6.01 Set "Connection Mode" to "Don't allow remote connections" or "Only allow Don't allow remote connections
connections with network level authentication (more secure)"
6.02 Set "Disable COM Port Redirection" to "True" Don't allow remote connections
6.03 Set "Disable Drive Redirection" to "True" Don't allow remote connections
6.04 Set "Disable LPT Port Redirection" to "True" Don't allow remote connections
6.05 Set "Disable Plug and Play Device" to "True" Don't allow remote connections
6.06 Set "Always Prompt For Password" to "True" Don't allow remote connections
6.08 Set "Minimum Encryption Level" to "High" Don't allow remote connections
6.09 Set "Single Session Restriction" to "True" Don't allow remote connections
6.10 Set "Use Temporary Folders Per Session" to "True" Don't allow remote connections
6.11 Set "Delete Temporary Folders On Exit" to "True" Don't allow remote connections
6.12 Set "Require Secure RPC Communication" to "True" Don't allow remote connections
7.01 Set "Audit: Audit the access of global system objects" to "Disabled" Disabled
7.02 Set "Audit: Audit the use of Backup and Restore privilege" to "Disabled" Disabled
7.03 Set "Audit: Force audit policy subcategory settings (Windows Vista or later) to Not Defined
override audit policy category settings" to "Enabled"
7.04 Set the "Audit Credential Validation" advanced audit policy to "Success and Failure" Success
7.05 Set the "Audit Kerberos Authentication Service" advanced audit policy to "Success
and Failure"
7.06 Set the "Audit Kerberos Service Ticket Operations" advanced audit policy to
"Success and Failure"
7.07 Set the "Audit Other Account Logon Events" advanced audit policy to "Success and
Failure"
7.08 Set the "Audit Application Group Management" advanced audit policy to "None"
7.09 Set the "Audit Computer Account Management" advanced audit policy to "Success
and Failure"
7.10 Set the "Audit Distribution Group Management" advanced audit policy to "None"
7.11 Set the "Audit Other Account Management Events" advanced audit policy to
"Success and Failure"
7.12 Set the "Audit Security Group Management" advanced audit policy to "Success and
Failure"
7.13 Set the "Audit User Account Management" advanced audit policy to "Success and
Failure"
7.14 Set the "Audit DPAPI Activity" advanced audit policy to "Success and Failure"
7.15 Set the "Audit PNP Activity" advanced audit policy to "Any"
7.16 Set the "Audit Process Creation" advanced audit policy to "Success and Failure"
7.17 Set the "Audit Process Termination" advanced audit policy to "None"
7.19 Set the "Audit Detailed Directory Service Replication" advanced audit policy to
"None" on domain controllers
7.20 Set the "Audit Directory Service Access" advanced audit policy to "None" on domain
controllers
7.21 Set the "Audit Directory Service Changes" advanced audit policy to "None" on
domain controllers
7.22 Set the "Audit Directory Service Replication" advanced audit policy to "None" on
domain controllers
7.23 Set the "Audit Account Lockout" advanced audit policy to "Success"
7.24 Set the "Audit Group Membership" advanced audit policy to "Success"
7.25 Set the "Audit IPsec Extended Mode" advanced audit policy to "None"
7.26 Set the "Audit IPsec Main Mode" advanced audit policy to "None"
7.27 Set the "Audit IPsec Quick Mode" advanced audit policy to "None"
7.29 Set the "Audit Logon" advanced audit policy to "Success and Failure"
7.30 Set the "Audit Network Policy Server" advanced audit policy to "None"
7.31 Set the "Audit Other Logon/Logoff Events" advanced audit policy to "None"
7.32 Set the "Audit Special Logon" advanced audit policy to "Success and Failure"
7.33 Set the "Audit User/Device Claims" advanced audit policy to "None"
7.34 Set the "Audit Application Generated" advanced audit policy to "None"
7.35 Set the "Audit Central Access Policy Staging" advanced audit policy to "None"
7.36 Set the "Audit Certification Services" advanced audit policy to "None"
7.37 Set the "Audit Detailed File Share" advanced audit policy to "None"
7.38 Set the "Audit File Share" advanced audit policy to "None"
7.39 Set the "Audit File System" advanced audit policy to "None"
7.40 Set the "Audit Filtering Platform Connection" advanced audit policy to "None"
7.41 Set the "Audit Filtering Platform Packet Drop" advanced audit policy to "None"
7.42 Set the "Audit Handle Manipulation" advanced audit policy to "None"
7.43 Set the "Audit Kernel Object" advanced audit policy to "None"
7.44 Set the "Audit Other Object Access Events" advanced audit policy to "None"
7.46 Set the "Audit Removable Storage" advanced audit policy to "None"
7.48 Set the "Audit Audit Policy Change" advanced audit policy to "Success and Failure"
7.49 Set the "Audit Authentication Policy Change" advanced audit policy to "Success and
Failure"
7.50 Set the "Audit Authorization Policy Change" advanced audit policy to "None"
7.51 Set the "Audit Filtering Platform Policy Change" advanced audit policy to "None"
7.52 Set the "Audit MPSSVC Rule-Level Policy Change" advanced audit policy to
"Success"
7.53 Set the "Audit Other Policy Change Events" advanced audit policy to "None"
7.54 Set the "Audit Non Sensitive Privilege Use" advanced audit policy to "None"
7.56 Set the "Audit Sensitive Privilege Use" advanced audit policy to "None"
7.57 Set the "Audit IPsec Driver" advanced audit policy to "Success and Failure"
7.58 Set the "Audit Other System Events" advanced audit policy to "None"
7.59 Set the "Audit Security State Change" advanced audit policy to "Success and
Failure"
7.60 Set the "Audit Security System Extension" advanced audit policy to "Success and
Failure"
7.61 Set the "Audit System Integrity" advanced audit policy to "Success and Failure"
8.01 Enable Windows Update to receive updates Never check for updates (not
recommended)
8.02 Configure Windows Update to use Windows Server Update Services (WSUS)
9.02 Set the NTP client type to "Domain Hierarchy (NT5DS)" for domain members and Domain Hierarchy (NT5DS)
"NTP" for PDC emulators and machines on workgroups
9.03 Enable the NTP server for domain controllers, and disable for all other servers and False
workstations
10.01 If SNMP is enabled, ensure that no "public" or "private" SNMP community strings are Not Installed
configured
10.02 If SNMP is enabled, ensure that no writable SNMP community strings are configured Not Installed
11.01 Ensure that Server Message Block (SMB) version 1 is disabled for the server service Server Feature Disabled
11.02 Ensure that Server Message Block (SMB) version 1 is disabled for the client Disabled
12.01 Set the maximum size of the Application event log to 40,960 KB or greater 20,480 KB
12.02 Set the maximum size of the Security event log to 81,920 KB or greater 20,480 KB
12.03 Set the maximum size of the Setup event log to 20,480 KB or greater 1,028 KB
12.04 Set the maximum size of the System event log to 20,480 KB or greater 20,480 KB
12.05 Set the retention policy of the Application event log to 'Overwrite events as needed' Overwrite events as needed
12.06 Set the retention policy of the Security event log to 'Overwrite events as needed' Overwrite events as needed
12.07 Set the retention policy of the Setup event log to 'Overwrite events as needed' Overwrite events as needed
12.08 Set the retention policy of the System event log to 'Overwrite events as needed' Overwrite events as needed
13.01 Set the "Access Credential Manager as a trusted caller" user right to [Empty]
13.02 Set the "Access this computer from the network" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
NT AUTHORITY\Authenticated Users BUILTIN\Users
Everyone
13.03 Set the "Act as part of the operating system" user right to [Empty]
13.04 Set the "Add workstations to domain" user right to [Empty] on domain controllers
13.05 Set the "Adjust memory quotas for a process" user right to include only BUILTIN\Administrators
13.06 Set the "Allow log on locally" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
BUILTIN\Backup Operators BUILTIN\Users
BUILTIN\Users
13.07 Set the "Allow log on through Remote Desktop Services" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Remote Desktop Users
BUILTIN\Remote Desktop Users
13.08 Set the "Back up files and directories" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
BUILTIN\Backup Operators
13.09 Set the "Bypass traverse checking" user right to [Any Value] BUILTIN\Administrators
BUILTIN\Backup Operators
BUILTIN\Users
Everyone
NT AUTHORITY\LOCAL SERVICE
NT AUTHORITY\NETWORK
SERVICE
NT
SERVICE\MSSQL$SQLEXPRESS
NT SERVICE\SQLAgent$SQLEXP
RESS
13.10 Set the "Change the system time" user right to include only BUILTIN\Administrators
BUILTIN\Administrators NT AUTHORITY\LOCAL SERVICE
NT AUTHORITY\LOCAL SERVICE
13.11 Set the "Change the time zone" user right to [Any Value] BUILTIN\Administrators
NT AUTHORITY\LOCAL SERVICE
13.12 Set the "Create a pagefile" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.14 Set the "Create global objects" user right to include only BUILTIN\Administrators
BUILTIN\Administrators NT AUTHORITY\LOCAL SERVICE
NT AUTHORITY\LOCAL SERVICE NT AUTHORITY\NETWORK
NT AUTHORITY\NETWORK SERVICE SERVICE
NT AUTHORITY\SERVICE NT AUTHORITY\SERVICE
13.15 Set the "Create permanent shared objects" user right to [Empty]
13.16 Set the "Create symbolic links" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
NT VIRTUAL MACHINE\Virtual Machines
13.17 Set the "Debug programs" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.18 Set the "Deny access to this computer from the network" user right to must include
BUILTIN\Guests
13.19 Set the "Deny log on as a batch job" user right to must include
BUILTIN\Guests
13.20 Set the "Deny log on as a service" user right to must include
BUILTIN\Guests
13.21 Set the "Deny log on locally" user right to must include
BUILTIN\Guests
13.22 Set the "Deny log on through Remote Desktop Services" user right to must include
BUILTIN\Guests
13.23 Set the "Enable computer and user accounts to be trusted for delegation" user right
to [Empty]
13.25 Set the "Generate security audits" user right to include only IIS APPPOOL\.NET v4.5
IIS APPPOOL\% IIS APPPOOL\.NET v4.5 Classic
NT AUTHORITY\LOCAL SERVICE IIS APPPOOL\DefaultAppPool
NT AUTHORITY\NETWORK SERVICE NT AUTHORITY\LOCAL SERVICE
NT SERVICE\adfssrv NT AUTHORITY\NETWORK
NT SERVICE\drs SERVICE
13.26 Set the "Impersonate a client after authentication" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\IIS_IUSRS
BUILTIN\IIS_IUSRS NT AUTHORITY\LOCAL SERVICE
NT AUTHORITY\LOCAL SERVICE NT AUTHORITY\NETWORK
NT AUTHORITY\NETWORK SERVICE SERVICE
NT AUTHORITY\SERVICE NT AUTHORITY\SERVICE
13.27 Set the "Increase a process working set" user right to include only BUILTIN\Users
BUILTIN\Device Owners
BUILTIN\Users
Window Manager\Window Manager Group
13.28 Set the "Increase scheduling priority" user right to include only BUILTIN\Administrators
BUILTIN\Administrators Window Manager\Window
Window Manager\Window Manager Group Manager Group
13.29 Set the "Load and unload device drivers" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.31 Set the "Log on as a batch job" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
BUILTIN\Backup Operators BUILTIN\IIS_IUSRS
BUILTIN\IIS_IUSRS BUILTIN\Performance Log Users
BUILTIN\Performance Log Users
13.32 Set the "Log on as a service" user right to include only IIS APPPOOL\.NET v4.5
IIS APPPOOL\% IIS APPPOOL\.NET v4.5 Classic
NT AUTHORITY\NETWORK SERVICE IIS APPPOOL\DefaultAppPool
NT SERVICE\% NT AUTHORITY\NETWORK
SERVICE
NT SERVICE\ALL SERVICES
NT
SERVICE\MSSQL$SQLEXPRESS
NT SERVICE\SQLAgent$SQLEXP
RESS
NT SERVICE\SQLTELEMETRY$S
QLEXPRESS
TEST2022\sysadmin
XCS-2K22\SQLServer2005SQLBro
wserUser$XCS-2K22
13.33 Set the "Manage auditing and security log" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.35 Set the "Modify firmware environment values" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.36 Set the "Obtain an impersonation token for another user in the same session" user Unknown
right to include only
BUILTIN\Administrators
13.37 Set the "Perform volume maintenance tasks" user right to include only BUILTIN\Administrators
BUILTIN\Administrators NT
SERVICE\MSSQL$SQLEXPRESS
13.38 Set the "Profile single process" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
13.39 Set the "Profile system performance" user right to include only BUILTIN\Administrators
BUILTIN\Administrators NT SERVICE\WdiServiceHost
NT SERVICE\WdiServiceHost
13.40 Set the "Remove computer from docking station" user right to [Any Value] BUILTIN\Administrators
13.41 Set the "Replace a process level token" user right to include only IIS APPPOOL\.NET v4.5
IIS APPPOOL\% IIS APPPOOL\.NET v4.5 Classic
NT AUTHORITY\LOCAL SERVICE IIS APPPOOL\DefaultAppPool
13.42 Set the "Restore files and directories" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
13.43 Set the "Shut down the system" user right to include only BUILTIN\Administrators
BUILTIN\Administrators BUILTIN\Backup Operators
13.44 Set the "Synchronize directory service data" user right to [Empty]
13.45 Set the "Take ownership of files or other objects" user right to include only BUILTIN\Administrators
BUILTIN\Administrators
14.01 Set the Windows Firewall domain profile firewall state to "On (recommended)" On (recommended)
14.02 Set the Windows Firewall domain profile default inbound action to "Block (default)" Block (default)
14.03 Set the Windows Firewall domain profile default outbound action to "Allow (default)" Allow (default)
14.04 Set the Windows Firewall domain profile display a notification setting to "No" No
14.05 Set the Windows Firewall domain profile excluded network interfaces to none
14.06 Set the Windows Firewall domain profile log file path to %systemroot%\system32\LogFiles\
"%SystemRoot%\System32\LogFiles\Firewall\DomainProfile.log" Firewall\pfirewall.log
14.07 Set the Windows Firewall domain profile log file size limit to 16,384 KB or greater 4,096 KB
14.08 Set the Windows Firewall domain profile log dropped packets setting to "Yes" No
14.09 Set the Windows Firewall domain profile log successful connections setting to "Yes" No
15.01 Set the Windows Firewall private profile firewall state to "On (recommended)" On (recommended)
15.02 Set the Windows Firewall private profile default inbound action to "Block (default)" Block (default)
15.03 Set the Windows Firewall private profile default outbound action to "Allow (default)" Allow (default)
15.04 Set the Windows Firewall private profile display a notification setting to "No" No
15.05 Set the Windows Firewall private profile excluded network interfaces to none
15.06 Set the Windows Firewall private profile log file path to %systemroot%\system32\LogFiles\
"%SystemRoot%\System32\LogFiles\Firewall\PrivateProfile.log" Firewall\pfirewall.log
15.07 Set the Windows Firewall private profile log file size limit to 16,384 KB or greater 4,096 KB
15.08 Set the Windows Firewall private profile log dropped packets setting to "Yes" No
15.09 Set the Windows Firewall private profile log successful connections setting to "Yes" No
16.01 Set the Windows Firewall public profile firewall state to "On (recommended)" On (recommended)
16.02 Set the Windows Firewall public profile default inbound action to "Block (default)" Block (default)
16.03 Set the Windows Firewall public profile default outbound action to "Allow (default)" Allow (default)
16.04 Set the Windows Firewall public profile display a notification setting to "No" No
16.05 Set the Windows Firewall public profile excluded network interfaces to none
16.06 Set the Windows Firewall public profile log file path to %systemroot%\system32\LogFiles\
"%SystemRoot%\System32\LogFiles\Firewall\PublicProfile.log" Firewall\pfirewall.log
16.07 Set the Windows Firewall public profile log file size limit to 16,384 KB or greater 4,096 KB
16.08 Set the Windows Firewall public profile log dropped packets setting to "Yes" No
17.01 Set the "App Runtime: Allow Microsoft accounts to be optional" security option to Not Defined
"Enabled"
17.02 Set the "Biometrics: Configure enhanced anti-spoofing" security option to "Enabled" Not Defined
17.03 Set the "Cloud Content: Turn off Microsoft consumer experiences" security option to Not Defined
"Enabled"
17.04 Set the "Connect: Require pin for pairing" security option to "First Time" or "Always" Not Defined
17.05 Set the "OneDrive: Prevent the usage of OneDrive for file storage" security option to Not Defined
"Enabled"
17.06 Set the "Regional and Language Options: Allow users to enable online speech Not Defined
recognition services" security option to "Disabled"
17.07 Set the "Windows Ink Workspace: Allow Windows Ink Workspace" security option to Not Defined
"Disabled" or "On, but disallow access above lock"
18.01 Set the "Accounts: Block Microsoft accounts" security option to "Users can’t add or Not Defined
log on with Microsoft accounts"
18.02 Set the "Accounts: Limit local account use of blank passwords to console logon only" Enabled
security option to "Enabled"
19.01 Set the "Audit Process Creation: Include command line in process creation events" Not Defined
security option to "Disabled" or "Not Defined"
19.02 Set the "Audit: Shut down system immediately if unable to log security audits" Disabled
security option to "Disabled"
20.01 Set the "Credential User Interface: Do not display the password reveal button" Not Defined
security option to "Enabled"
20.02 Set the "Credential User Interface: Enumerate administrator accounts on elevation" Not Defined
security option to "Disabled"
21.01 Set the "Credentials Delegation: Encryption Oracle Remediation" security option to Not Defined
"Force Updated Clients"
21.02 Set the "Credentials Delegation: Remote host allows delegation of non-exportable Not Defined
credentials" security option to "Enabled"
22.01 Set the "Data Collection and Preview Builds: Allow Diagnostics Data" security option Send required diagnostic data
to "Diagnostic data off (not recommended)" or "Send required diagnostic data" on
Windows Server 2022, Windows 10 build 20348, Windows 11 and newer
22.02 Set the "Data Collection and Preview Builds: Allow Telemetry" security option to "0 -
Security [Enterprise Only]" or "1 - Basic" on Windows Server 2016, Windows Server
2019, and Windows 10 prior to build 20348
22.03 Set the "Data Collection and Preview Builds: Do not show feedback notifications" Not Defined
security option to "Enabled"
22.04 Set the "Data Collection and Preview Builds: Toggle user control over Insider builds" Enabled
security option to "Disabled"
23.01 Set the "Devices: Allowed to format and eject removable media" security option to Not Defined
"Administrators"
23.02 Set the "Devices: Prevent users from installing printer drivers" security option to Enabled
"Enabled"
24.01 Set the "Domain controller: Allow server operators to schedule tasks" security option
to "Disabled" on domain controllers
24.02 Set the "Domain controller: LDAP server signing requirements" security option to
"Require signing" on domain controllers
24.03 Set the "Domain controller: Refuse machine account password changes" security
option to "Disabled" on domain controllers
25.01 Set the "Domain member: Digitally encrypt or sign secure channel data (always)" Disabled
security option to "Enabled" on domain members
25.02 Set the "Domain member: Digitally encrypt secure channel data (when possible)" Disabled
security option to "Enabled" on domain members
25.03 Set the "Domain member: Digitally sign secure channel data (when possible)" Disabled
security option to "Enabled" on domain members
25.04 Set the "Domain member: Disable machine account password changes" security Enabled
option to "Disabled" on domain members
25.05 Set the "Domain member: Maximum machine account password age" security option 0 days
to 30 days on domain members
25.06 Set the "Domain member: Require strong (Windows 2000 or later) session key" Disabled
security option to "Enabled" on domain members
26.01 Set the "AutoPlay Policies: Disallow Autoplay for non-volume devices" security option Not Defined
to "Enabled"
26.02 Set the "AutoPlay Policies: Set the default behavior for AutoRun" security option to Not Defined
"Do not execute any autorun commands"
26.03 Set the "AutoPlay Policies: Turn off Autoplay" security option to "All drives" Not Defined
26.04 Set the "File Explorer: Configure Microsoft Defender SmartScreen" security option to Not Defined
"Warn and prevent bypass"
26.05 Set the "File Explorer: Enable Microsoft Defender SmartScreen" security option to Not Defined
"Enabled"
26.06 Set the "File Explorer: Turn off Data Execution Prevention for Explorer" security Not Defined
option to "Disabled"
26.07 Set the "File Explorer: Turn off heap termination on corruption" security option to Not Defined
"Disabled" or "Not Defined"
26.08 Set the "File Explorer: Turn off shell protocol protected mode" security option to Not Defined
"Disabled" or "Not Defined"
27.01 Set the "Group Policy: Continue experiences on this device" security option to Not Defined
"Disabled" on domain members
27.02 Set the "Group Policy: Registry policy processing: Do not apply during periodic Not Defined
background processing" security option to "Disabled" on domain members
27.03 Set the "Group Policy: Registry policy processing: Process even if the Group Policy Not Defined
objects have not changed" security option to "Enabled" on domain members
27.04 Set the "Group Policy: Turn off background refresh of Group Policy" security option to Not Defined
"Disabled" or "Not Defined" on domain members
28.01 Set the "Interactive logon: Do not display last user name" security option to "Enabled" Disabled
28.02 Set the "Interactive logon: Do not require CTRL+ALT+DEL" security option to Disabled
"Disabled"
28.03 Set the "Interactive logon: Machine account lockout threshold" security option to a Not Defined
value between 6 and 10.
28.05 Set the "Interactive logon: Message text for users attempting to log on" security
option to an appropriate value
28.06 Set the "Interactive logon: Message title for users attempting to log on" security
option to an appropriate value
28.07 Set the "Interactive logon: Number of previous logons to cache (in case domain 11 logons
controller is not available)" security option to "0" for servers and "0" for workstations
on domain members that are not domain controllers
28.08 Set the "Interactive logon: Prompt user to change password before expiration" 5 days
security option to a value between 5 and 10 days
28.09 Set the "Interactive logon: Require Domain Controller authentication to unlock Disabled
workstation" security option to "Enabled" on domain members that are not domain
controllers
28.10 Set the "Interactive logon: Smart card removal behavior" security option to "Lock No Action
Workstation", "Force Logoff", or "Disconnect if a Remote Desktop Services session"
29.01 Set the "Internet Explorer: Disable Internet Explorer as a stand alone browser" Disable browser never notify user
security option to "Disable browser never notify user", "Disable browser always notify
user", or "Disable browser notify user once"
29.02 Set the "Internet Explorer: Prevent downloading of enclosures" security option to Not Defined
"Enabled"
30.01 Set the "Lanman Workstation: Enable insecure guest logons" security option to Not Defined
"Disabled"
31.01 Set the "Logon: Block user from showing account details on sign-in" security option Not Defined
to "Enabled"
31.02 Set the "Logon: Do not display network selection UI" security option to "Enabled" Not Defined
31.03 Set the "Logon: Do not enumerate connected users on domain-joined computers" Not Defined
security option to "Enabled" on domain members
31.04 Set the "Logon: Enumerate local users on domain-joined computers" security option Enabled
to "Disabled" on domain members that are not domain controllers
31.05 Set the "Logon: Turn off app notifications on the lock screen" security option to Not Defined
"Enabled"
31.06 Set the "Logon: Turn off picture password sign-in" security option to "Enabled" on Not Defined
domain members
31.07 Set the "Logon: Turn on convenience PIN sign-in" security option to "Disabled" on Not Defined
domain members
31.08 Set the "Windows Logon Options: Sign-in and lock last interactive user automatically Disabled
after a restart" security setting to "Disabled"
32.01 Set the "Microsoft Accounts: Block all consumer Microsoft account user Not Defined
authentication" security option to "Enabled"
33.01 Set the "Microsoft Defender Antivirus: Configure detection for potentially unwanted Audit Mode
applications" security option to "Block"
33.02 Set the "Microsoft Defender Antivirus: Configure local setting override for reporting to Not Defined
Microsoft MAPS" security option to "Disabled" or "Not Defined"
33.03 Set the "Microsoft Defender Antivirus: Configure Watson events" security option to Not Defined
"Disabled"
33.04 Set the "Microsoft Defender Antivirus: Join Microsoft MAPS" security option to Not Defined
"Disabled" or "Not Defined"
33.06 Set the "Microsoft Defender Antivirus: Scan removable drives" security option to Not Defined
"Enabled"
33.07 Set the "Microsoft Defender Antivirus: Turn off Microsoft Defender AntiVirus" security Disabled
option to "Disabled" or "Not Defined"
33.08 Set the "Microsoft Defender Antivirus: Turn on behavior monitoring" security option to Not Defined
"Enabled" or "Not Defined"
33.09 Set the "Microsoft Defender Antivirus: Turn on e-mail scanning" security option to Not Defined
"Enabled"
34.01 Set the "Microsoft network client: Digitally sign communications (always)" security Disabled
option to "Enabled"
34.02 Set the "Microsoft network client: Digitally sign communications (if server agrees)" Enabled
security option to "Enabled"
34.03 Set the "Microsoft network client: Send unencrypted password to connect to Disabled
third-party SMB servers" security option to "Disabled"
35.01 Set the "Microsoft network server: Amount of idle time required before suspending 15 minutes
session" security option to "15 minutes"
35.02 Set the "Microsoft network server: Digitally sign communications (always)" security Disabled
option to "Enabled"
35.03 Set the "Microsoft network server: Digitally sign communications (if client agrees)" Disabled
security option to "Enabled"
35.04 Set the "Microsoft network server: Disconnect clients when logon hours expire" Enabled
security option to "Enabled"
35.05 Set the "Microsoft network server: Server SPN target name validation level" security Not Defined
option to "Accept if provided by client" or "Required from client"
36.01 Set the "MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)" Disabled
security option to "Disabled" or "Not Defined"
36.02 Set the "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level Not Defined
(protects against packet spoofing)" security option to "Highest protection, source
routing is completely disabled"
36.03 Set the "MSS: (DisableIPSourceRouting) IP source routing protection level (protects Not Defined
against packet spoofing)" security option to "Highest protection, source routing is
completely disabled"
36.04 Set the "MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF Enabled
generated routes" security option to "Disabled"
36.05 Set the "MSS: (KeepAliveTime) How often keep-alive packets are sent in Not Defined
milliseconds" security option to "300000 or 5 minutes (recommended)"
36.06 Set the "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS Not Defined
name release requests except from WINS servers" security option to "Enabled"
36.07 Set the "MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Not Defined
Gateway addresses (could lead to DoS)" security option to "Disabled"
36.08 Set the "MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)" Not Defined
security option to "Enabled" or "Not Defined"
36.09 Set the "MSS: (ScreenSaverGracePeriod) The time in seconds before the screen Not Defined
saver grace period expires (0 recommended)" security option to 5 seconds or less
36.10 Set the "MSS: (TcpMaxDataRetransmissions IPv6) How many times Not Defined
unacknowledged data is retransmitted" security option to 3
36.11 Set the "MSS: (TcpMaxDataRetransmissions) How many times unacknowledged Not Defined
data is retransmitted" security option to 3
37.01 Set the "DNS Client: Turn off multicast name resolution" security option to "Enabled" Not Defined
37.02 Set the "TCP/IP: NetBT NodeType" security option to "P-node (recommended)" Not Defined
38.01 Set the "Network access: Allow anonymous SID/Name translation" security option to Unknown
"Disabled" (must be set with Group Policy)
38.02 Set the "Network access: Do not allow anonymous enumeration of SAM accounts Disabled
and shares" security option to "Enabled"
38.03 Set the "Network access: Do not allow anonymous enumeration of SAM accounts" Enabled
security option to "Enabled"
38.04 Set the "Network access: Do not allow storage of passwords and credentials for Disabled
network authentication" security option to "Enabled"
38.05 Set the "Network access: Let Everyone permissions apply to anonymous users" Disabled
security option to "Disabled"
38.06 Set the "Network access: Named Pipes that can be accessed anonymously" security
option to only contain
[Empty]
38.07 Set the "Network access: Remotely accessible registry paths and subpaths" security Software\Microsoft\OLAP Server
option to include only Software\Microsoft\Windows
Software\Microsoft\OLAP Server NT\CurrentVersion\Perflib
Software\Microsoft\Windows NT\CurrentVersion\Perflib Software\Microsoft\Windows
Software\Microsoft\Windows NT\CurrentVersion\Print NT\CurrentVersion\Print
Software\Microsoft\Windows NT\CurrentVersion\Windows Software\Microsoft\Windows
System\CurrentControlSet\Control\ContentIndex NT\CurrentVersion\Windows
System\CurrentControlSet\Control\Print\Printers System\CurrentControlSet\Control\
System\CurrentControlSet\Control\Terminal Server ContentIndex
System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration System\CurrentControlSet\Control\
System\CurrentControlSet\Control\Terminal Server\UserConfig Print\Printers
System\CurrentControlSet\Services\Eventlog System\CurrentControlSet\Control\
System\CurrentControlSet\Services\SysmonLog Terminal Server
System\CurrentControlSet\Control\
Terminal
Server\DefaultUserConfiguration
System\CurrentControlSet\Control\
Terminal Server\UserConfig
System\CurrentControlSet\Services
\Eventlog
System\CurrentControlSet\Services
\SysmonLog
38.08 Set the "Network access: Remotely accessible registry paths" security option to Software\Microsoft\Windows
include only NT\CurrentVersion
Software\Microsoft\Windows NT\CurrentVersion System\CurrentControlSet\Control\
System\CurrentControlSet\Control\ProductOptions ProductOptions
System\CurrentControlSet\Control\Server Applications System\CurrentControlSet\Control\
Server Applications
38.09 Set the "Network access: Restrict anonymous access to Named Pipes and Shares" Enabled
security option to "Enabled"
38.10 Set the "Network access: Restrict clients allowed to make remote calls to SAM" O:BAG:BAD:(A;;RC;;;BA)(A;;RC;;;
security option to "Administrators: Remote Access: Allow" on stand-alone machines WD)
and domain members that are not domain controllers
38.11 Set the "Network access: Shares that can be accessed anonymously" security option Not Defined
to an empty value
38.12 Set the "Network access: Sharing and security model for local accounts" security Classic - local users authenticate
option to "Classic - Local users authenticate as themselves" as themselves
39.01 Set the "Network Connections: Prohibit installation and configuration of Network Not Defined
Bridge on your DNS domain network" security option to "Enabled"
39.02 Set the "Network Connections: Prohibit use of Internet Connection Sharing on your Not Defined
DNS domain network" security option to "Enabled"
40.01 Set the "Network Provider: Hardened UNC Paths" security option to
\\*\NETLOGON RequireMutualAuthentication=1, RequireIntegrity=1
\\*\SYSVOL RequireMutualAuthentication=1, RequireIntegrity=1
41.01 Set the "Network security: Allow Local System to use computer identity for NTLM" Not Defined
security option to "Enabled"
41.02 Set the "Network security: Allow LocalSystem NULL session fallback" security option Not Defined
to "Disabled"
41.03 Set the "Network security: Allow PKU2U authentication requests to this computer to Enabled
use online identities" security option to "Disabled" on domain members
41.04 Set the "Network security: Configure encryption types allowed for Kerberos" security DES_CBC_CRC
option to "AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types" DES_CBC_MD5
on domain members RC4_HMAC_MD5
AES128_HMAC_SHA1
AES256_HMAC_SHA1
Future encryption types
41.05 Set the "Network security: Do not store LAN Manager hash value on next password Enabled
change" security option to "Enabled"
41.06 Set the "Network security: Force logoff when logon hours expire" security option to Unknown
"Enabled"
41.07 Set the "Network security: LAN Manager authentication level" security option to Not Defined
"Send NTLMv2 response only. Refuse LM & NTLM"
41.08 Set the "Network security: LDAP client signing requirements" security option to Negotiate Signing
"Require Signing"
41.09 Set the "Network security: Minimum session security for NTLM SSP based (including Require 128-bit encryption
secure RPC) clients" security option to "Require NTLMv2 session security, Require
128-bit encryption"
41.10 Set the "Network security: Minimum session security for NTLM SSP based (including Require 128-bit encryption
secure RPC) servers" security option to "Require NTLMv2 session security, Require
128-bit encryption"
42.01 Set the "Personalization: Prevent enabling lock screen camera" security option to Enabled
"Enabled"
42.02 Set the "Personalization: Prevent enabling lock screen slide show" security option to Enabled
"Enabled"
43.01 Set the "Recovery console: Allow automatic administrative logon" security option to Disabled
"Disabled"
43.02 Set the "Recovery Console: Allow floppy copy and access to drives and folders" Disabled
security option to "Disabled"
44.01 Set the "Remote Assistance: Allow Offer Remote Assistance" security option to Not Defined
"Disabled"
44.02 Set the "Remote Assistance: Allow Solicited Remote Assistance" security option to Not Defined
"Disabled"
45.01 Set the "Remote Desktop Connection Client: Do not allow passwords to be saved" Not Defined
security option to "Enabled"
46.01 Set the "Remote Procedure Call: Enable RPC Endpoint Mapper Client Enabled
Authentication" security option to "Enabled" on domain members that are not domain
46.02 Set the "Remote Procedure Call: Restrict Unauthenticated RPC clients" security Authenticated
option to "Authenticated" on domain members that are not domain controllers
47.01 Set the "Search: Allow Cloud Search" security option to "Disable Cloud Search" Not Defined
47.02 Set the "Search: Allow indexing of encrypted files" security option to "Disabled" or Not Defined
"Not Defined"
48.01 Set the "Security Providers: WDigest Authentication" security option to "Disabled" or Not Defined
"Not Defined"
49.01 Set the "Early Launch Antimalware: Boot-Start Driver Initialization Policy" security Not Defined
option to "Good, unknown and bad but critical" or "Not Defined"
49.02 Set the "Shutdown: Allow system to be shut down without having to log on" security Disabled
option to "Disabled" (only applies to server operating systems)
49.03 Set the "Shutdown: Clear virtual memory pagefile" security option to "Enabled" Disabled
50.01 Set the "System cryptography: Force strong key protection for user keys stored on Not Defined
the computer" security option to "User is prompted when the key is first used" or
higher
51.01 Set the "System objects: Require case insensitivity for non-Windows subsystems" Enabled
security option to "Enabled"
51.02 Set the "System objects: Strengthen default permissions of internal system objects Enabled
(e.g. Symbolic Links)" security option to "Enabled"
52.01 Set the "System settings: Optional subsystems" security option to include only
[Empty]
52.02 Set the "System settings: Use certificate rules on Windows executables for Software Disabled
Restriction Policies" security option to "Enabled"
53.01 Set the "User Account Control: Admin Approval Mode for the Built-in Administrator Not Defined
account" security option to "Enabled"
53.02 Set the "User Account Control: Allow UIAccess applications to prompt for elevation Disabled
without using the secure desktop" security option to "Disabled"
53.03 Set the "User Account Control: Apply UAC restrictions to local accounts on network Not Defined
logons" security option to "Enabled"
53.04 Set the "User Account Control: Behavior of the elevation prompt for administrators in Prompt for consent for
Admin Approval Mode" security option to "Prompt for consent on the secure desktop" non-Windows binaries
53.05 Set the "User Account Control: Behavior of the elevation prompt for standard users" Prompt for credentials
security option to "Automatically deny elevation requests"
53.06 Set the "User Account Control: Detect application installations and prompt for Enabled
elevation" security option to "Enabled"
53.07 Set the "User Account Control: Only elevate UIAccess applications that are installed Enabled
in secure locations" security option to "Enabled"
53.08 Set the "User Account Control: Run all administrators in Admin Approval Mode" Enabled
security option to "Enabled"
53.09 Set the "User Account Control: Switch to the secure desktop when prompting for Enabled
elevation" security option to "Enabled"
53.10 Set the "User Account Control: Virtualize file and registry write failures to per-user Enabled
locations" security option to "Enabled"
54.01 Set the "Windows Connection Manager: Minimize the number of simultaneous Not Defined
connections to the Internet or a Windows Domain" security option to "1 = Minimize
simultaneous connections" or "Not Defined"
54.02 Set the "Windows Connection Manager: Prohibit connection to non-domain networks Enabled
when connected to domain authenticated network" security option to "Enabled" on
domain members
55.01 Set the "Windows Installer: Allow user control over installs" security option to Not Defined
"Disabled" or "Not Defined"
55.02 Set the "Windows Installer: Always install with elevated privileges" security option to Not Defined
"Disabled" or "Not Defined"
55.03 Set the "Windows Installer: Prevent Internet Explorer security prompt for Windows Not Defined
Installer scripts'" security option to "Disabled" or "Not Defined"
56.01 Set the "Windows PowerShell: Turn on PowerShell Script Block Logging" security Not Defined
option to "Enabled"
56.02 Set the "Windows PowerShell: Turn on PowerShell Transcription" security option to Not Defined
"Enabled"
57.01 Set the "Windows Security: App and browser protection: Prevent users from Not Defined
modifying settings" security option to "Enabled"
City Oxford
Room
Rack
Name Rack 1A
Hardware Information
Manufacturer HP
ProLiant DL360 G4
Virtualization
Enclosure Details
Enclosure Model
System Information
UUID DA424D56-B5E0-9E8B-C0EA-EFF459BD06DD
VMW71.00V.18452719.B64.2108091906
Current Language
2 Disk Drives
[0] VMware Virtual SATA Hard Drive Serial ATA (SATA) 00000000000000000001 Master Boot Record (MBR) 60 GB
[1] VMware Virtual NVMe Disk NVMe VMWare NVME_0000 GUID Partition Table (GPT) 60 GB
General
Size 60 GB
Status
Operational Status OK
Storage Pools
1 Partitions
E:
Active False
Size 59.94 GB
General
Size 60 GB
Location nvme0
GUID {a63b8588-2640-4f03-adf6-01a5a21d30e5}
Signature
Status
Operational Status OK
Storage Pools
Unallocated Space
Unallocated Space 15 MB
3 Partitions
Active False
Volume Name
Size 59.37 GB
Item ID 1021
Hardware Information
Model M04
4 Volumes
Volume Details
Capacity 59.37 GB
Drive Letter C:
Label
Enabled False
Disk Quota
State Disabled
Security
Owner NT SERVICE\TrustedInstaller
6 NTFS Permissions
BUILTIN\Users False Allow Create folders / append data This folder and subfolders
BUILTIN\Users False Allow Read & execute This folder, subfolders and
files
CREATOR OWNER False Allow Full control Subfolders and files only
TEST2022\sysadmin False Success Read & execute This folder, subfolders and
files
Volume Details
Capacity 59.94 GB
Drive Letter E:
Enabled False
Security
Owner BUILTIN\Administrators
6 NTFS Permissions
BUILTIN\Users False Allow Create folders / append data This folder and subfolders
BUILTIN\Users False Allow Create files / write data This folder, subfolders and
Read & execute files
CREATOR OWNER False Allow Full control Subfolders and files only
Everyone False Allow Read & execute This folder, subfolders and
files
Volume Details
Capacity 96 MB
Drive Letter
Label
Enabled False
Volume Details
Capacity 523 MB
Drive Letter
Label
Enabled False
Batteries
Computer
Disk drives
VMware Virtual SATA Hard Drive Microsoft 10.0.20348.1 Device is working properly.
Display adapters
DVD/CD-ROM drives
Intel(R) 82371AB/EB PCI Bus Master IDE Microsoft 10.0.20348.1 Device is working properly.
Controller
VMware USB Pointing Device VMware, Inc. 12.5.10.0 Device is working properly.
VMware USB Pointing Device VMware, Inc. 12.5.10.0 Device is working properly.
Monitors
Network adapters
Intel(R) 82574L Gigabit Network Connection Microsoft 12.18.9.23 Device is working properly.
Microsoft Kernel Debug Network Adapter Microsoft 10.0.20348.1 Device is working properly.
Print queues
Intel(R) Core(TM) i9-10885H CPU @ 2.40GHz Microsoft 10.0.20348.1 Device is working properly.
Intel(R) Core(TM) i9-10885H CPU @ 2.40GHz Microsoft 10.0.20348.1 Device is working properly.
Software devices
Microsoft Radio Device Enumeration Bus Microsoft 10.0.20348.1 Device is working properly.
Storage controllers
Storage volumes
Standard Enhanced PCI to USB Host Controller Microsoft 10.0.20348.1 Device is working properly.
Standard Universal PCI to USB Host Controller Microsoft 10.0.20348.1 Device is working properly.
Standard USB 3.1 eXtensible Host Controller - 1.0 Microsoft 10.0.20348.1 Device is working properly.
(Microsoft)
USB Root Hub (USB 3.0) Microsoft 10.0.20348.1 Device is working properly.
Physical Memory
2 Printers
Printer Properties
Comment
Capabilities Copies
Color
Collate
Location
Separator Page
Advanced
Priority 1
Share Configuration
Permissions
Printer Properties
Comment
Capabilities Copies
Color
Location
Separator Page
Advanced
Priority 1
Share Configuration
Permissions
2 Processors
Manufacturer GenuineIntel
Number Of Cores 1
NumberOfLogicalProcessors 1
Processor Id 0F8BFBFF000A0652
Virtualization Settings
Manufacturer GenuineIntel
Number Of Cores 1
NumberOfLogicalProcessors 1
Processor Id 0F8BFBFF000A0652
Virtualization Settings
Item ID 1022
Hardware Information
Model MTL01
1 Video Controllers
VMware SVGA 3D
Drivers vm3dum64_loader.dll
Networking Information
Advanced
Shares 5
General
File Type
Hidden False
Advanced
Encrypted False
Compressed False
Security
Owner NT AUTHORITY\SYSTEM
5 NTFS Permissions
ALL APPLICATION True Allow Read & execute This folder or file only
PACKAGES
APPLICATION PACKAGE True Allow Read & execute This folder or file only
AUTHORITY\ALL
RESTRICTED APP
PACKAGES
BUILTIN\Users True Allow Read & execute This folder or file only
File Contents
1 Network Adapters
Ethernet0 Device is working properly. Intel(R) 82574L Gigabit Network Connection 00-0C-29-BD-06-DD
Ethernet0
Index 0012
Network Category
IP Configuration
IP Addresses fe80::8032:2d0f:4e06:f641%12/0.0.0.64
192.168.131.246/24
WINS Settings
Advanced Properties
Packet Priority & VLAN *PriorityVLANTag Packet Priority & VLAN Enabled 3
General Settings
Enabled False
11 Active Routes
255.255.255.255 255.255.255.255 0.0.0.0 Intel(R) 82574L Gigabit Network Connection 281 Local
224.0.0.0 240.0.0.0 0.0.0.0 Intel(R) 82574L Gigabit Network Connection 281 Local
192.168.131.255 255.255.255.255 0.0.0.0 Intel(R) 82574L Gigabit Network Connection 281 Local
192.168.131.246 255.255.255.255 0.0.0.0 Intel(R) 82574L Gigabit Network Connection 281 Local
192.168.131.0 255.255.255.0 0.0.0.0 Intel(R) 82574L Gigabit Network Connection 281 Local
Enabled False
SNMP Settings
Installed False
5 Shares
Path C:\Windows
Cache Setting Only files and folders that users specify are available offline.
Security
Owner NT SERVICE\TrustedInstaller
9 NTFS Permissions
ALL APPLICATION False Allow Read & execute This folder, subfolders and
PACKAGES files
APPLICATION PACKAGE False Allow Read & execute This folder, subfolders and
AUTHORITY\ALL files
RESTRICTED APP
PACKAGES
BUILTIN\Users False Allow Read & execute This folder, subfolders and
files
CREATOR OWNER False Allow Full control Subfolders and files only
Path C:\
Cache Setting Only files and folders that users specify are available offline.
Security
Owner NT SERVICE\TrustedInstaller
6 NTFS Permissions
BUILTIN\Users False Allow Create folders / append data This folder and subfolders
BUILTIN\Users False Allow Read & execute This folder, subfolders and
files
CREATOR OWNER False Allow Full control Subfolders and files only
TEST2022\sysadmin False Success Read & execute This folder, subfolders and
files
Path E:\
Cache Setting Only files and folders that users specify are available offline.
Security
Owner BUILTIN\Administrators
6 NTFS Permissions
BUILTIN\Users False Allow Create folders / append data This folder and subfolders
BUILTIN\Users False Allow Create files / write data This folder, subfolders and
Read & execute files
CREATOR OWNER False Allow Full control Subfolders and files only
Everyone False Allow Read & execute This folder, subfolders and
files
Path
Cache Setting Only files and folders that users specify are available offline.
Share Permissions
Security
Owner TEST2022\sysadmin
6 NTFS Permissions
BUILTIN\Users True Allow Read & execute This folder, subfolders and
files
BUILTIN\Users True Allow Create files / write data This folder and subfolders
Create folders / append data
CREATOR OWNER True Allow Full control Subfolders and files only
Security Identifiers
Local Administrator
Name Administrator
Enabled True
Guest Account
Name Guest
Enabled False
Local Administrators
Name Administrators
Members S-1-5-32-579
XCS-2K22\Administrator
Account Logon
Account Management
Detailed Tracking
DS Access
Object Access
Policy Change
System
Personal 1
Trusted People 0
Trusted Publisher 0
Web Hosting 0
1 Certificates
General
Subject CN=WMSvc-SHA2-XCS-2K22
Issuer CN=WMSvc-SHA2-XCS-2K22
Certificate Details
Version 3
Properties
Thumbprint FBC432C75BC858C9F3788080D1F0C25423DC20DC
Password Policy
General Settings
Installed True
Enabled True
Policy Settings
Password Length 14
Guest Built-in account for guest access to the computer/domain True True
WDAGUtilityAccount A user account managed and used by the system for Windows Defender Application False False
Guard scenarios.
Account Details
Name Administrator
Enabled True
Profile
Home Drive Z:
Account Details
Name DefaultAccount
Enabled False
Full Name
Profile
Profile Path
Login Script
Home Drive
Home Directory
Account Details
Name Guest
Enabled False
Full Name
Profile
Profile Path
Login Script
Home Drive
Home Directory
Account Details
Name WDAGUtilityAccount
Description A user account managed and used by the system for Windows Defender Application Guard scenarios.
Enabled False
Full Name
Profile
Profile Path
Login Script
Home Drive
Home Directory
Description Members of this group can remotely query authorization attributes and permissions for resources on
this computer.
Members
Administrators
Members S-1-5-32-579
XCS-2K22\Administrator
Backup Operators
Description Backup Operators can override security restrictions for the sole purpose of backing up or restoring files
Members
Description Members of this group are allowed to connect to Certification Authorities in the enterprise
Members
Cryptographic Operators
Members
Device Owners
Members
Description Members are allowed to launch, activate and use Distributed COM objects on this machine.
Members
Description Members of this group can read event logs from local machine
Members
Guests
Description Guests have the same access as members of the Users group by default, except for the Guest account
which is further restricted
Members XCS-2K22\Guest
Hyper-V Administrators
Description Members of this group have complete and unrestricted access to all features of Hyper-V.
Members
IIS_IUSRS
Members
Description Members in this group can have some administrative privileges to manage configuration of networking
features
Members
Description Members of this group may schedule logging of performance counters, enable trace providers, and
collect event traces both locally and via remote access to this computer
Members
Description Members of this group can access performance counter data locally and remotely
Members NT SERVICE\MSSQL$SQLEXPRESS
NT SERVICE\SQLAgent$SQLEXPRESS
Power Users
Description Power Users are included for backwards compatibility and possess limited administrative powers
Members
Print Operators
Members
Description Servers in this group run virtual machines and host sessions where users RemoteApp programs and
personal virtual desktops run. This group needs to be populated on servers running RD Connection
Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to
be in this group.
Members
Description Servers in this group can perform routine administrative actions on servers running Remote Desktop
Services. This group needs to be populated on all servers in a Remote Desktop Services deployment.
The servers running the RDS Central Management service must be included in this group.
Members
Description Servers in this group enable users of RemoteApp programs and personal virtual desktops access to
these resources. In Internet-facing deployments, these servers are typically deployed in an edge
network. This group needs to be populated on servers running RD Connection Broker. RD Gateway
servers and RD Web Access servers used in the deployment need to be in this group.
Members
Description Members in this group are granted the right to logon remotely
Members
Description Members of this group can access WMI resources over management protocols (such as
WS-Management via the Windows Remote Management service). This applies only to WMI
namespaces that grant access to the user.
Members
Replicator
Members
SQLServer2005SQLBrowserUser$XCS-2K22
Description Members in the group have the required access and privileges to be assigned as the log on account for
the associated instance of SQL Server Browser.
Members NT SERVICE\SQLBrowser
Description Members of this group have complete and unrestricted access to all features of Storage Replica.
Members
Members XCS-2K22\DefaultAccount
Users
Description Users are prevented from making accidental or intentional system-wide changes and can run most
applications
General Settings
Antivirus Signature
Cloud
Exclusions
Accounts: Limit local account use of blank passwords to console logon only Enabled Configured Locally
App Runtime: Allow Microsoft accounts to be optional Not Defined Not Defined
Audit Process Creation: Include command line in process creation events Not Defined Not Defined
Audit: Audit the access of global system objects Disabled Configured Locally
Audit: Audit the use of Backup and Restore privilege Disabled Configured Locally
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings. Not Defined Not Defined
Audit: Shut down system immediately if unable to log security audits Disabled Configured Locally
AutoPlay Policies: Disallow Autoplay for non-volume devices Not Defined Not Defined
AutoPlay Policies: Set the default behavior for AutoRun Not Defined Not Defined
Cloud Content: Turn off Microsoft consumer experiences Not Defined Not Defined
Credential User Interface: Do not display the password reveal button Not Defined Not Defined
Credential User Interface: Enumerate administrator accounts on elevation Not Defined Not Defined
Credentials Delegation: Remote host allows delegation of non-exportable credentials Not Defined Not Defined
Data Collection and Preview Builds: Allow Diagnostics Data Send required diagnostic data Default Domain Policy
Data Collection and Preview Builds: Do not show feedback notifications Not Defined Not Defined
DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined Not Defined
DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined Not Defined
Devices: Allowed to format and eject removable media Not Defined Not Defined
Devices: Prevent users from installing printer drivers Enabled Configured Locally
Devices: Restrict CD-ROM access to locally logged-on user only Not Defined Not Defined
Devices: Restrict floppy access to locally logged-on user only Not Defined Not Defined
DNS Client: Turn off multicast name resolution Not Defined Not Defined
Domain controller: Allow server operators to schedule tasks Disabled Default Domain Policy
Domain controller: LDAP server signing requirements None Default Domain Policy
Domain controller: Refuse machine account password changes Disabled Default Domain Policy
Domain member: Digitally encrypt or sign secure channel data (always) Disabled Default Domain Policy
Domain member: Digitally encrypt secure channel data (when possible) Disabled Default Domain Policy
Domain member: Digitally sign secure channel data (when possible) Disabled Default Domain Policy
Domain member: Disable machine account password changes Enabled Default Domain Policy
Domain member: Maximum machine account password age 0 days Default Domain Policy
Domain member: Require strong (Windows 2000 or later) session key Disabled Default Domain Policy
Early Launch Antimalware: Boot-Start Driver Initialization Policy Not Defined Not Defined
EMET: Default Action and Mitigation Settings: Anti Detours Not Defined Not Defined
EMET: Default Action and Mitigation Settings: Banned Functions Not Defined Not Defined
EMET: Default Action and Mitigation Settings: Deep Hooks Not Defined Not Defined
EMET: Default Action and Mitigation Settings: Exploit Action Not Defined Not Defined
Event Log: Application: Specify the maximum log file size (KB) Not Defined Not Defined
Event Log: Security: Control Event Log behavior when the log file reaches its maximum size Not Defined Not Defined
Event Log: Security: Specify the maximum log file size (KB) Not Defined Not Defined
Event Log: Setup: Control Event Log behavior when the log file reaches its maximum size Not Defined Not Defined
Event Log: Setup: Specify the maximum log file size (KB) Not Defined Not Defined
Event Log: System: Control Event Log behavior when the log file reaches its maximum size Not Defined Not Defined
Event Log: System: Specify the maximum log file size (KB) Not Defined Not Defined
File Explorer: Enable Microsoft Defender SmartScreen Not Defined Not Defined
File Explorer: Microsoft Defender SmartScreen Level Not Defined Not Defined
File Explorer: Turn off Data Execution Prevention for Explorer Not Defined Not Defined
File Explorer: Turn off heap termination on corruption Not Defined Not Defined
File Explorer: Turn off shell protocol protected mode Not Defined Not Defined
Group Policy: Continue experiences on this device Not Defined Not Defined
Group Policy: Registry policy processing: Do not apply during periodic background processing Not Defined Not Defined
Group Policy: Registry policy processing: Process even if the Group Policy objects have not changed Not Defined Not Defined
Group Policy: Turn off background refresh of Group Policy Not Defined Not Defined
Interactive logon: Display user information when the session is locked Not Defined Not Defined
Interactive logon: Do not display last user name Disabled Configured Locally
Interactive logon: Machine account lockout threshold Not Defined Not Defined
Interactive logon: Message text for users attempting to log on Configured Locally
Interactive logon: Message title for users attempting to log on Configured Locally
Interactive logon: Number of previous logons to cache (in case domain controller is not available) 11 logons Default Domain Policy
Interactive logon: Prompt user to change password before expiration 5 days Configured Locally
Internet Communication settings: Turn off access to the Store Not Defined Not Defined
Internet Communication Settings: Turn off downloading of print drivers over HTTP Not Defined Not Defined
Internet Communication Settings: Turn off handwriting personalization data sharing Not Defined Not Defined
Internet Communication Settings: Turn off handwriting recognition error reporting Not Defined Not Defined
Internet Communication Settings: Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com Not Defined Not Defined
Internet Communication Settings: Turn off Internet download for Web publishing and online ordering wizards Not Defined Not Defined
Internet Communication Settings: Turn off printing over HTTP Not Defined Not Defined
Internet Communication Settings: Turn off Registration if URL connection is referring to Microsoft.com Not Defined Not Defined
Internet Communication Settings: Turn off Search Companion content file updates Not Defined Not Defined
Internet Communication Settings: Turn off the "Order Prints" picture task Not Defined Not Defined
Internet Communication Settings: Turn off the "Publish to Web" task for files and folders Not Defined Not Defined
Internet Communication Settings: Turn off the Windows Messenger Customer Experience Improvement Program Not Defined Not Defined
Internet Communication Settings: Turn off Windows Customer Experience Improvement Program Not Defined Not Defined
Internet Communication Settings: Turn off Windows Error Reporting Not Defined Not Defined
Internet Explorer: Disable Internet Explorer as a stand alone browser Disable browser never notify user Default Domain Policy
Lanman Workstation: Enable insecure guest logons Not Defined Not Defined
Locale Services: Disallow copying of user input methods to the system account for sign-in Not Defined Not Defined
Location and Sensors: Turn off location Not Defined Not Defined
Logon: Block user from showing account details on sign-in Not Defined Not Defined
Logon: Do not enumerate connected users on domain-joined computers Not Defined Not Defined
Logon: Turn off app notifications on the lock screen Not Defined Not Defined
Logon: Turn off picture password sign-in Not Defined Not Defined
Microsoft Accounts: Block all consumer Microsoft account user authentication Not Defined Not Defined
Microsoft Defender Antivirus: Configure detection for potentially unwanted applications Audit Mode Default Domain Policy
Microsoft Defender Antivirus: Configure local setting override for reporting to Microsoft MAPS Not Defined Not Defined
Microsoft Defender Antivirus: Configure Watson events Not Defined Not Defined
Microsoft Defender Antivirus: Join Microsoft MAPS Not Defined Not Defined
Microsoft Defender Antivirus: Prevent users and apps from accessing dangerous websites Audit Mode Default Domain Policy
Microsoft Defender Antivirus: Scan removable drives Not Defined Not Defined
Microsoft Defender Antivirus: Turn off Microsoft Defender AntiVirus Disabled Local Group Policy
Microsoft Defender Antivirus: Turn on behavior monitoring Not Defined Not Defined
Microsoft Defender Antivirus: Turn on e-mail scanning Not Defined Not Defined
Microsoft network client: Digitally sign communications (always) Disabled Configured Locally
Microsoft network client: Digitally sign communications (if server agrees) Enabled Configured Locally
Microsoft network client: Enable SMB version 1 protocol Disabled Configured Locally
Microsoft network client: Send unencrypted password to connect to third-party SMB servers Disabled Configured Locally
Microsoft network server: Amount of idle time required before suspending a session 15 minutes Configured Locally
Microsoft network server: Attempt S4U2Self to obtain claim information Not Defined Not Defined
Microsoft network server: Digitally sign communications (always) Disabled Configured Locally
Microsoft network server: Digitally sign communications (if client agrees) Disabled Configured Locally
Microsoft network server: Disconnect clients when logon hours expire Enabled Configured Locally
Microsoft network server: Enable SMB version 1 protocol Not Defined Not Defined
Microsoft network server: Enable SMB version 2 protocol Not Defined Not Defined
Microsoft network server: Server SPN target name validation level Not Defined Not Defined
MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended) Disabled Configured Locally
MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) Not Defined Not Defined
MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) Not Defined Not Defined
MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes Enabled Configured Locally
MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds Not Defined Not Defined
MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers Not Defined Not Defined
MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS) Not Defined Not Defined
MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) Not Defined Not Defined
MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended) Not Defined Not Defined
MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted Not Defined Not Defined
MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted Not Defined Not Defined
MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning Not Defined Not Defined
Network access: Do not allow anonymous enumeration of SAM accounts Enabled Configured Locally
Network access: Do not allow anonymous enumeration of SAM accounts and shares Disabled Configured Locally
Network access: Do not allow storage of passwords and credentials for network authentication Disabled Configured Locally
Network access: Let Everyone permissions apply to anonymous users Disabled Configured Locally
Network access: Named pipes that can be accessed anonymously Configured Locally
Network access: Remotely accessible registry paths Software\Microsoft\Windows NT\CurrentVersion Configured Locally
System\CurrentControlSet\Control\ProductOptions
System\CurrentControlSet\Control\Server
Applications
Network access: Remotely accessible registry paths and subpaths Software\Microsoft\OLAP Server Configured Locally
Software\Microsoft\Windows
NT\CurrentVersion\Perflib
Software\Microsoft\Windows
NT\CurrentVersion\Print
Software\Microsoft\Windows
NT\CurrentVersion\Windows
System\CurrentControlSet\Control\ContentIndex
System\CurrentControlSet\Control\Print\Printers
System\CurrentControlSet\Control\Terminal
Server
System\CurrentControlSet\Control\Terminal
Network access: Restrict anonymous access to Named Pipes and Shares Enabled Configured Locally
Network access: Restrict clients allowed to make remote calls to SAM O:BAG:BAD:(A;;RC;;;BA)(A;;RC;;;WD) Default Domain Policy
Network access: Shares that can be accessed anonymously Not Defined Not Defined
Network access: Sharing and security model for local accounts Classic - local users authenticate as themselves Configured Locally
Network Connections: Prohibit installation and configuration of Network Bridge on your DNS domain network Not Defined Not Defined
Network Connections: Prohibit use of Internet Connection Sharing on your DNS domain network Not Defined Not Defined
Network Connections: Require domain users to elevate when setting a network's location Not Defined Not Defined
Network security: Allow Local System to use computer identity for NTLM Not Defined Not Defined
Network security: Allow LocalSystem NULL session fallback Not Defined Not Defined
Network security: Allow PKU2U authentication requests to this computer to use online identities. Enabled Default Domain Policy
Network security: Configure encryption types allowed for Kerberos DES_CBC_CRC Default Domain Policy
DES_CBC_MD5
RC4_HMAC_MD5
AES128_HMAC_SHA1
AES256_HMAC_SHA1
Future encryption types
Network security: Do not store LAN Manager hash value on next password change Enabled Configured Locally
Network security: LAN Manager authentication level Not Defined Not Defined
Network security: LDAP client signing requirements Negotiate Signing Configured Locally
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Require 128-bit encryption Configured Locally
Network security: Minimum session security for NTLM SSP based (including secure RPC) servers Require 128-bit encryption Configured Locally
Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication Not Defined Not Defined
Network security: Restrict NTLM: Add server exceptions in this domain Not Defined Not Defined
Network security: Restrict NTLM: Audit Incoming NTLM Traffic Not Defined Not Defined
Network security: Restrict NTLM: Audit NTLM authentication in this domain Not Defined Not Defined
Network security: Restrict NTLM: NTLM authentication in this domain Not Defined Not Defined
Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers Not Defined Not Defined
OneDrive: Prevent the usage of OneDrive for file storage Not Defined Not Defined
Personalization: Prevent enabling lock screen camera Enabled Default Domain Policy
Personalization: Prevent enabling lock screen slide show Enabled Default Domain Policy
Recovery console: Allow floppy copy and access to all drives and all folders Disabled Configured Locally
Regional and Language Options: Allow users to enable online speech recognition services Not Defined Not Defined
Remote Assistance: Allow Offer Remote Assistance Not Defined Not Defined
Remote Assistance: Allow Solicited Remote Assistance Not Defined Not Defined
Remote Desktop Connection Client: Do not allow passwords to be saved Not Defined Not Defined
Remote Procedure Call: Enable RPC Endpoint Mapper Client Authentication Enabled Default Domain Policy
Remote Procedure Call: Restrict Unauthenticated RPC clients Authenticated Default Domain Policy
Secure Channel: Enable SSL 3.0 (Client) Not Defined Not Defined
Secure Channel: Enable SSL 3.0 (Server) Not Defined Not Defined
Secure Channel: Enable TLS 1.0 (Client) Not Defined Not Defined
Secure Channel: Enable TLS 1.0 (Server) Not Defined Not Defined
Secure Channel: Enable TLS 1.1 (Client) Not Defined Not Defined
Secure Channel: Enable TLS 1.1 (Server) Not Defined Not Defined
Secure Channel: Enable TLS 1.2 (Client) Not Defined Not Defined
Secure Channel: Enable TLS 1.2 (Server) Not Defined Not Defined
Shutdown: Allow system to be shut down without having to log on Disabled Configured Locally
Sleep Settings: Require a password when a computer wakes (on battery) Not Defined Not Defined
Sleep Settings: Require a password when a computer wakes (plugged in) Not Defined Not Defined
System Cryptography: Force strong key protection for user keys stored on the computer Not Defined Not Defined
System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Disabled Configured Locally
System objects: Require case insensitivity for non-Windows subsystems Enabled Configured Locally
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enabled Configured Locally
System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies Disabled Configured Locally
Turn off Microsoft Peer-to-Peer Networking Services Not Defined Not Defined
User Account Control: Admin Approval Mode for the built-in Administrator account Not Defined Not Defined
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop Disabled Configured Locally
User Account Control: Apply UAC restrictions to local accounts on network logons Not Defined Not Defined
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Prompt for consent for non-Windows binaries Configured Locally
User Account Control: Behavior of the elevation prompt for standard users Prompt for credentials Configured Locally
User Account Control: Detect application installations and prompt for elevation Enabled Configured Locally
User Account Control: Only elevate executables that are signed and validated Disabled Configured Locally
User Account Control: Only elevate UIAccess applications that are installed in secure locations Enabled Configured Locally
User Account Control: Run all administrators in Admin approval mode Enabled Configured Locally
User Account Control: Switch to the secure desktop when prompting for elevation Enabled Configured Locally
User Account Control: Virtualize file and registry write failures to per-user locations Enabled Configured Locally
Windows Connect Now: Configuration of wireless settings using Windows Connect Now Not Defined Not Defined
Windows Connect Now: Prohibit access of the Windows Connect Now wizards Not Defined Not Defined
Windows Connection Manager: Prohibit connection to non-domain networks when connected to domain authenticated network Enabled Default Domain Policy
Windows Ink Workspace: Allow Windows Ink Workspace Not Defined Not Defined
Windows Installer: Allow user control over installs Not Defined Not Defined
Windows Installer: Always install with elevated privileges Not Defined Not Defined
Windows Installer: Prevent Internet Explorer security prompt for Windows Installer scripts Not Defined Not Defined
Windows Logon Options: Sign-in and lock last interactive user automatically after a restart Disabled Configured Locally
Windows PowerShell: Turn on PowerShell Script Block Logging Not Defined Not Defined
Windows Security: App and browser protection: Prevent users from modifying settings Not Defined Not Defined
Windows Update: Defer feature updates 365 days Default Domain Policy
Windows Update: Manage preview builds (Branch Readiness Level) Not Defined Not Defined
44 User Rights
Enable computer and user accounts to be trusted for delegation SeEnableDelegationPrivilege Configured
Locally
General Settings
Firewall Profiles
Name State
Firewall State
Network Interfaces
Excluded Interfaces
Settings
Logging Settings
Firewall State
Network Interfaces
Excluded Interfaces
Settings
Logging Settings
Firewall State
Network Interfaces
Excluded Interfaces
Settings
Logging Settings
Rule Name Profile Names Protocol Local Local Ports Remote Remote
Addresses Addresses Ports
AllJoyn Router (TCP-In) Domain, Private TCP Any 9955 Any Any
AllJoyn Router (UDP-In) Domain, Private UDP Any Any Any Any
Cast to Device functionality (qWave-TCP-In) Private, Public TCP Any 2177 PlayToDevice Any
Cast to Device functionality (qWave-UDP-In) Private, Public UDP Any 2177 PlayToDevice Any
Cast to Device SSDP Discovery (UDP-In) Public UDP Any PlayToDiscovery Any Any
Cast to Device streaming server (HTTP-Streaming-In) Domain TCP Any 10246 Any Any
Cast to Device streaming server (HTTP-Streaming-In) Public TCP Any 10246 PlayToDevice Any
Cast to Device streaming server (HTTP-Streaming-In) Private TCP Any 10246 LocalSubnet Any
Cast to Device streaming server (RTCP-Streaming-In) Private UDP Any Any LocalSubnet Any
Cast to Device streaming server (RTCP-Streaming-In) Domain UDP Any Any Any Any
Cast to Device streaming server (RTCP-Streaming-In) Public UDP Any Any PlayToDevice Any
Cast to Device streaming server (RTSP-Streaming-In) Domain TCP Any 23554, 23555, 23556 Any Any
Cast to Device streaming server (RTSP-Streaming-In) Private TCP Any 23554, 23555, 23556 LocalSubnet Any
Cast to Device streaming server (RTSP-Streaming-In) Public TCP Any 23554, 23555, 23556 PlayToDevice Any
Cast to Device UPnP Events (TCP-In) Public TCP Any 2869 PlayToDevice Any
Core Networking - Destination Unreachable (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-In) Any ICMPv4 Any RPC Any Any
Core Networking - Dynamic Host Configuration Protocol for IPv6(DHCPV6-In) Any UDP Any 546 Any 547
Core Networking - Internet Group Management Protocol (IGMP-In) Any 2 Any Any Any Any
Core Networking - IPHTTPS (TCP-In) Any TCP Any IPHTTPSIn Any Any
Core Networking - Multicast Listener Done (ICMPv6-In) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Query (ICMPv6-In) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Report (ICMPv6-In) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Report v2 (ICMPv6-In) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Neighbour Discovery Advertisement (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Neighbour Discovery Solicitation (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Packet Too Big (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Parameter Problem (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Router Advertisement (ICMPv6-In) Any ICMPv6 Any RPC fe80::/64 Any
Core Networking - Router Solicitation (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Core Networking - Teredo (UDP-In) Any UDP Any Teredo Any Any
Core Networking - Time Exceeded (ICMPv6-In) Any ICMPv6 Any RPC Any Any
Desktop App Web Viewer Domain, Private, Public Any Any Any Any Any
Desktop App Web Viewer Domain, Private, Public Any Any Any Any Any
DIAL protocol server (HTTP-In) Private TCP Any 10247 LocalSubnet Any
DIAL protocol server (HTTP-In) Domain TCP Any 10247 Any Any
File and Printer Sharing (Echo Request - ICMPv4-In) Domain ICMPv4 Any RPC Any Any
File and Printer Sharing (Echo Request - ICMPv6-In) Domain ICMPv6 Any RPC Any Any
File and Printer Sharing (LLMNR-UDP-In) Domain UDP Any 5355 LocalSubnet Any
File and Printer Sharing (NB-Datagram-In) Domain UDP Any 138 Any Any
File and Printer Sharing (NB-Session-In) Any TCP Any 139 Any Any
File and Printer Sharing (SMB-In) Any TCP Any 445 Any Any
File and Printer Sharing (Spooler Service - RPC) Domain TCP Any RPC Any Any
File and Printer Sharing (Spooler Service - RPC-EPMAP) Domain TCP Any RPCEPMap Any Any
File Server Remote Management (DCOM-In) Any TCP Any 135 Any Any
File Server Remote Management (SMB-In) Any TCP Any 445 Any Any
File Server Remote Management (WMI-In) Any TCP Any RPC Any Any
Microsoft Media Foundation Network Source IN [TCP 554] Any TCP Any 554, 8554-8558 LocalSubnet Any
Microsoft Media Foundation Network Source IN [UDP 5004-5009] Any UDP Any 5000-5020 LocalSubnet Any
Network Discovery (WSD Events-In) Private TCP Any 5357 Any Any
Network Discovery (WSD EventsSecure-In) Private TCP Any 5358 Any Any
Web Management Service (HTTP Traffic-In) Any TCP Any 8172 Any Any
Windows Management Instrumentation (WMI-In) Any TCP Any Any Any Any
Windows Remote Management (HTTP-In) Public TCP Any 5985 LocalSubnet Any
Windows Remote Management (HTTP-In) Domain, Private TCP Any 5985 Any Any
Workplace or school account Domain, Private Any Any Any Any Any
Workplace or school account Domain, Private Any Any Any Any Any
World Wide Web Services (HTTP Traffic-In) Any TCP Any 80 Any Any
World Wide Web Services (HTTPS Traffic-In) Any TCP Any 443 Any Any
World Wide Web Services (QUIC Traffic-In) Any UDP Any 443 Any Any
Rule Name Profile Names Protocol Local Local Remote Addresses Remote Ports
Addresses
Ports
AllJoyn Router (TCP-Out) Domain, Private TCP Any Any Any Any
AllJoyn Router (UDP-Out) Domain, Private UDP Any Any Any Any
Captive Portal Flow Domain, Private, Public Any Any Any Any Any
Captive Portal Flow Domain, Private, Public Any Any Any Any Any
Cast to Device functionality (qWave-TCP-Out) Private, Public TCP Any Any PlayToDevice 2177
Cast to Device functionality (qWave-UDP-Out) Private, Public UDP Any Any PlayToDevice 2177
Cast to Device streaming server (RTP-Streaming-Out) Domain UDP Any Any Any Any
Cast to Device streaming server (RTP-Streaming-Out) Public UDP Any Any PlayToDevice Any
Cast to Device streaming server (RTP-Streaming-Out) Private UDP Any Any LocalSubnet Any
Connected User Experiences and Telemetry Any TCP Any Any Any 443
Core Networking - Dynamic Host Configuration Protocol (DHCP-Out) Any UDP Any 68 Any 67
Core Networking - Dynamic Host Configuration Protocol for IPv6 (DHCPV6-Out) Any UDP Any 546 Any 547
Core Networking - Group Policy (LSASS-Out) Domain TCP Any Any Any Any
Core Networking - Group Policy (NP-Out) Domain TCP Any Any Any 445
Core Networking - Group Policy (TCP-Out) Domain TCP Any Any Any Any
Core Networking - Internet Group Management Protocol (IGMP-Out) Any 2 Any Any Any Any
Core Networking - IPHTTPS (TCP-Out) Any TCP Any Any Any IPHTTPSOut
Core Networking - Multicast Listener Query (ICMPv6-Out) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Report (ICMPv6-Out) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Multicast Listener Report v2 (ICMPv6-Out) Any ICMPv6 Any RPC LocalSubnet6 Any
Core Networking - Neighbour Discovery Advertisement (ICMPv6-Out) Any ICMPv6 Any RPC Any Any
Core Networking - Neighbour Discovery Solicitation (ICMPv6-Out) Any ICMPv6 Any RPC Any Any
Core Networking - Packet Too Big (ICMPv6-Out) Any ICMPv6 Any RPC Any Any
Core Networking - Parameter Problem (ICMPv6-Out) Any ICMPv6 Any RPC Any Any
Core Networking - Router Advertisement (ICMPv6-Out) Any ICMPv6 fe80::/64 RPC LocalSubnet6 Any
ff02::1
fe80::/64
Core Networking - Router Solicitation (ICMPv6-Out) Any ICMPv6 Any RPC LocalSubnet6 Any
ff02::2
fe80::/64
Core Networking - Teredo (UDP-Out) Any UDP Any Any Any Any
Core Networking - Time Exceeded (ICMPv6-Out) Any ICMPv6 Any RPC Any Any
Desktop App Web Viewer Domain, Private, Public Any Any Any Any Any
Desktop App Web Viewer Domain, Private, Public Any Any Any Any Any
Email and accounts Domain, Private, Public Any Any Any Any Any
Email and accounts Domain, Private, Public Any Any Any Any Any
File and Printer Sharing (Echo Request - ICMPv4-Out) Domain ICMPv4 Any RPC Any Any
File and Printer Sharing (Echo Request - ICMPv6-Out) Domain ICMPv6 Any RPC Any Any
File and Printer Sharing (LLMNR-UDP-Out) Domain UDP Any Any LocalSubnet 5355
File and Printer Sharing (NB-Datagram-Out) Domain UDP Any Any Any 138
File and Printer Sharing (NB-Name-Out) Domain UDP Any Any Any 137
File and Printer Sharing (NB-Session-Out) Domain TCP Any Any Any 139
File and Printer Sharing (SMB-Out) Domain TCP Any Any Any 445
Network Discovery (Pub WSD-Out) Private UDP Any Any LocalSubnet 3702
Network Discovery (WSD Events-Out) Private TCP Any Any Any 5357
Network Discovery (WSD EventsSecure-Out) Private TCP Any Any Any 5358
Windows Default Lock Screen Domain, Private, Public Any Any Any Any Any
Windows Default Lock Screen Domain, Private, Public Any Any Any Any Any
Windows Defender SmartScreen Domain, Private, Public Any Any Any Any Any
Windows Defender SmartScreen Domain, Private, Public Any Any Any Any Any
Windows Device Management Certificate Installer (TCP out) Any TCP Any Any Any Any
Windows Device Management Device Enroller (TCP out) Any TCP Any Any Any 80, 443
Windows Device Management Enrolment Service (TCP out) Any TCP Any Any Any Any
Windows Device Management Sync Client (TCP out) Any TCP Any Any Any Any
Windows Feature Experience Pack Domain, Private, Public Any Any Any Any Any
Windows Feature Experience Pack Domain, Private, Public Any Any Any Any Any
Windows Search Domain, Private, Public Any Any Any Any Any
Windows Search Domain, Private, Public Any Any Any Any Any
Windows Security Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Windows Shell Experience Domain, Private, Public Any Any Any Any Any
Workplace or school account Domain, Private, Public Any Any Any Any Any
Workplace or school account Domain, Private, Public Any Any Any Any Any
Your account Domain, Private, Public Any Any Any Any Any
Your account Domain, Private, Public Any Any Any Any Any
3 Windows Patches
The system can be configured either directly or using Group Policy, and updates can be obtained
directly from Microsoft over an internet connection or from a Windows Software Update (WSUS) Server
installed on the intranet.
General Settings
Advanced
4 History Items
31 August 2022 16:29:29 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 Install Succeeded
(Version 1.373.1294.0)
31 August 2022 16:46:59 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 Install Succeeded
(Version 1.373.1302.0)
02 September 2022 10:54:56 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 Install Failed
(Version 1.373.1394.0)
31 August 2022 16:36:46 Update for Microsoft Defender Antivirus antimalware platform - KB4052623 Install Succeeded
(Version 4.18.2205.7)
Operating System
General
Installed Programs 15
Event Logs 9
Environment Variables 21
Scheduled Tasks 6
1 Files
File Details
Located True
General
Hidden False
Advanced
Encrypted False
Compressed False
Security
Owner NT AUTHORITY\SYSTEM
6 NTFS Permissions
ALL APPLICATION True Allow Read & execute This folder or file only
PACKAGES
APPLICATION PACKAGE True Allow Read & execute This folder or file only
AUTHORITY\ALL
RESTRICTED APP
PACKAGES
BUILTIN\IIS_IUSRS True Allow Read & execute This folder or file only
BUILTIN\Users True Allow Read & execute This folder or file only
<configProtectedData defaultProvider="RsaProtectedConfigurationProvider">
<providers>
<add name="RsaProtectedConfigurationProvider"
type="System.Configuration.RsaProtectedConfigurationProvider,System.Configuration, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a"
description="Uses RsaCryptoServiceProvider to encrypt and decrypt"
keyContainerName="NetFrameworkConfigurationKey"
cspProviderName=""
useMachineContainer="true"
useOAEP="true" />
<add name="DataProtectionConfigurationProvider"
type="System.Configuration.DpapiProtectedConfigurationProvider,System.Configuration, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a"
description="Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt"
useMachineProtection="true"
keyEntropy="" />
</providers>
</configProtectedData>
<runtime />
<connectionStrings>
<add name="LocalSqlServer" connectionString="data source=.\SQLEXPRESS;Integrated
Security=SSPI;AttachDBFilename=|DataDirectory|aspnetdb.mdf;User Instance=true" providerName="System.Data.SqlClient"/>
</connectionStrings>
<system.data>
<DbProviderFactories />
</system.data>
<system.serviceModel>
<extensions>
<behaviorExtensions>
<add name="persistenceProvider" type="System.ServiceModel.Configuration.PersistenceProviderElement,
System.WorkflowServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"/>
<add name="workflowRuntime" type="System.ServiceModel.Configuration.WorkflowRuntimeElement,
System.WorkflowServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"/>
<add name="enableWebScript" type="System.ServiceModel.Configuration.WebScriptEnablingElement,
System.ServiceModel.Web, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"/>
<add name="webHttp" type="System.ServiceModel.Configuration.WebHttpElement, System.ServiceModel.Web,
Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"/>
<add name="serviceDiscovery" type="System.ServiceModel.Discovery.Configuration.ServiceDiscoveryElement,
System.ServiceModel.Discovery, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />
<add name="endpointDiscovery" type="System.ServiceModel.Discovery.Configuration.EndpointDiscoveryElement,
System.ServiceModel.Discovery, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />
<httpHandlers />
<membership>
<providers>
<add name="AspNetSqlMembershipProvider"
type="System.Web.Security.SqlMembershipProvider, System.Web, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a"
connectionStringName="LocalSqlServer"
enablePasswordRetrieval="false"
enablePasswordReset="true"
requiresQuestionAndAnswer="true"
applicationName="/"
requiresUniqueEmail="false"
passwordFormat="Hashed"
maxInvalidPasswordAttempts="5"
minRequiredPasswordLength="7"
minRequiredNonalphanumericCharacters="1"
passwordAttemptWindow="10"
passwordStrengthRegularExpression="" />
</providers>
</membership>
<profile>
<providers>
<add name="AspNetSqlProfileProvider" connectionStringName="LocalSqlServer" applicationName="/"
type="System.Web.Profile.SqlProfileProvider, System.Web, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</profile>
<roleManager>
<providers>
<add name="AspNetSqlRoleProvider" connectionStringName="LocalSqlServer" applicationName="/"
type="System.Web.Security.SqlRoleProvider, System.Web, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a" />
<add name="AspNetWindowsTokenRoleProvider" applicationName="/"
type="System.Web.Security.WindowsTokenRoleProvider, System.Web, Version=4.0.0.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</roleManager>
</system.web>
</configuration>
The event logging service records events from various sources and stores them in a single collection
called an event log.
9 Event Logs
Name Application
Enabled True
File Access
Retention
Name ForwardedEvents
Enabled False
Record Count 0
File Access
Retention
Name HardwareEvents
Enabled True
File Size 68 KB
Record Count 0
File Access
Retention
Enabled True
File Size 68 KB
Record Count 0
File Access
Retention
Enabled True
File Size 68 KB
Record Count 0
File Access
Retention
Name Security
Enabled True
File Access
Retention
Success Audit 02 September 2022 12:18:10 Security-Auditing 4719 Audit Policy Change N/A
Success Audit 02 September 2022 12:18:10 Security-Auditing 4719 Audit Policy Change N/A
Success Audit 02 September 2022 12:18:10 Security-Auditing 4719 Audit Policy Change N/A
Success Audit 02 September 2022 12:18:10 Security-Auditing 4719 Audit Policy Change N/A
Success Audit 02 September 2022 12:18:10 Security-Auditing 4719 Audit Policy Change N/A
Success Audit 02 September 2022 12:18:10 Security-Auditing 4719 Audit Policy Change N/A
Success Audit 02 September 2022 12:18:10 Security-Auditing 4719 Audit Policy Change N/A
Success Audit 02 September 2022 12:18:10 Security-Auditing 4719 Audit Policy Change N/A
Success Audit 02 September 2022 11:54:56 Security-Auditing 4719 Audit Policy Change N/A
Success Audit 02 September 2022 11:54:56 Security-Auditing 4719 Audit Policy Change N/A
Name Setup
Enabled True
File Size 68 KB
Record Count 47
File Access
Retention
Name System
Enabled True
File Access
Retention
Information 02 September 2022 12:36:43 Service Control Manager 7036 None N/A
Information 02 September 2022 12:34:16 Service Control Manager 7036 None N/A
Information 02 September 2022 12:33:55 Service Control Manager 7036 None N/A
Information 02 September 2022 12:33:55 Service Control Manager 7036 None N/A
Information 02 September 2022 12:33:55 Service Control Manager 7036 None N/A
Information 02 September 2022 12:33:46 Service Control Manager 7036 None N/A
Information 02 September 2022 12:33:16 Service Control Manager 7036 None N/A
Information 02 September 2022 12:33:16 Service Control Manager 7036 None N/A
Information 02 September 2022 12:32:55 Service Control Manager 7036 None N/A
Information 02 September 2022 12:31:57 Service Control Manager 7036 None N/A
Enabled True
File Access
Retention
Information 02 September 2022 12:36:56 PowerShell 800 Pipeline Execution Details N/A
21 Environment Variables
%NUMBER_OF_PROCESSORS% <SYSTEM> 2
%SystemDrive% <SYSTEM> C:
15 Installed Programs
Browser for SQL Server 2019 Microsoft Corporation 32 bit 15.0.2000.5 01 September 2021
Local Administrator Password Solution Microsoft Corporation 64 bit 6.2.0.0 31 August 2022
Microsoft ODBC Driver 17 for SQL Server Microsoft Corporation 64 bit 17.8.1.1 31 May 2022
Microsoft OLE DB Driver for SQL Server Microsoft Corporation 64 bit 18.2.3.0 01 September 2021
Microsoft SQL Server 2012 Native Client Microsoft Corporation 64 bit 11.4.7462.6 01 September 2021
Microsoft SQL Server 2019 (64-bit) Microsoft Corporation 64 bit 01 September 2021
Microsoft SQL Server 2019 Setup (English) Microsoft Corporation 64 bit 15.0.4013.40 01 September 2021
Microsoft SQL Server 2019 T-SQL Language Service Microsoft Corporation 64 bit 15.0.2000.5 01 September 2021
Microsoft Visual C++ 2015-2019 Redistributable (x64) - 14.28.29913 Microsoft Corporation 32 bit 14.28.29913.0 31 May 2022
Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.28.29913 Microsoft Corporation 32 bit 14.28.29913.0 31 May 2022
Microsoft VSS Writer for SQL Server 2019 Microsoft Corporation 64 bit 15.0.2000.5 01 September 2021
Internet Settings
System Proxy
Administrators True
Users True
Drivers 23
Data Sources 1
23 ODBC Drivers
Driver da Microsoft para arquivos texto (*.txt; *.csv) x86 2.50 odbcjt32.dll
SQL Server Native Client RDA 11.0 x64 3.80 2011.110.5069.66 sqlnclirda11.dll
SQL Server Data Source x64 SQL Server This is a SQL Server data source.
General Settings
Driver C:\Windows\system32\SQLSRV32.dll
Platform x64
SQL Server
Server XCS-2K22
Database
Database Filename
Encrypt False
Language
1 Properties
Name Value
LastUser sysadmin
Operating System
General
Version 10.0.20348
Country Code 44
Locale 0809
Domain test2022.net
Timezone
Registry
PowerShell Settings
Is Installed True
Permissions
Audit Rules
1 Registry Keys
1 Registry Values
Registry Key
Located True
Hive HKEY_LOCAL_MACHINE
12 Values
Security
Owner NT AUTHORITY\SYSTEM
6 Registry Permissions
Registry Value
Located True
Value XIAConfiguration
BranchCache Available
iSCSI Target Storage Provider (VDS and VSS hardware providers) Available
Hyper-V Available
Routing Available
AD DS Tools Available
ASP Available
CGI Available
Tracing Available
Performance Installed
Security Installed
bginfo
User Public
SecurityHealth
Command %windir%\system32\SecurityHealthSystray.exe
Location HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
User Public
Location HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
User Public
6 Scheduled Tasks
General
Name GoogleUpdateTaskMachineCore{722D3B95-1358-4B6A-B6EA-1BA14905F9D7}
Task Path \
Author
Enabled True
Hidden False
Security
Settings
Execution Time Limit Stop the task if it runs longer than 3 days
Conditions
Execute Action
Arguments /c
Working Directory
Repetition No repetition
Enabled True
On specified schedule
Repetition No repetition
Enabled True
General
Name GoogleUpdateTaskMachineUA{B5FB06C2-DBE0-4D16-A4FB-4073AED798C6}
Task Path \
Author
Enabled True
Hidden False
Security
Settings
Execution Time Limit Stop the task if it runs longer than 3 days
Conditions
Execute Action
Working Directory
Enabled True
General
Name MicrosoftEdgeUpdateTaskMachineCore
Task Path \
Author
Enabled True
Hidden False
Security
Settings
Execution Time Limit Stop the task if it runs longer than 3 days
Conditions
Execute Action
Arguments /c
Working Directory
Repetition No repetition
Enabled True
On specified schedule
Repetition No repetition
Enabled True
General
Name MicrosoftEdgeUpdateTaskMachineUA
Task Path \
Author
Enabled True
Hidden False
Security
Settings
Execution Time Limit Stop the task if it runs longer than 3 days
Conditions
Execute Action
Working Directory
Enabled True
General
Task Path \
Enabled True
Hidden False
Security
Settings
Execution Time Limit Stop the task if it runs longer than 3 days
Conditions
Execute Action
Command "C:\PROCESSEXPLORER\PROCEXP64.EXE"
Arguments /t
Working Directory
Repetition No repetition
Enabled True
General
Task Path \
Enabled True
Hidden False
Security
Settings
Execution Time Limit Stop the task if it runs longer than 3 days
Conditions
Execute Action
Command "C:\PROCESSEXPLORER\PROCEXP64.EXE"
Arguments /t
Working Directory
Repetition No repetition
Enabled True
Service Settings
IPv4 Filter *
IPv6 Filter *
Started True
Version 10.0.20348.1
Listener Listener_1084132640
Enabled True
Address *
Port 5985
Protocol HTTP
Client Settings
Trusted Hosts *
CaptureService_526cb Manual
cbdhsvc_526cb Automatic
CDPUserSvc_526cb Automatic
Connected Devices Platform Service Automatic (Delayed Start, Trigger Start) NT AUTHORITY\LocalService
ConsentUxUserSvc_526cb Manual
CredentialEnrollmentManagerUserSvc_526cb Manual
Device Management Wireless Application Protocol (WAP) Push message Routing Service Disabled LocalSystem
DeviceAssociationBrokerSvc_526cb Manual
DevicePickerUserSvc_526cb Disabled
DevicesFlowUserSvc_526cb Manual
IKE and AuthIP IPsec Keying Modules Manual (Trigger Start) LocalSystem
Microsoft Edge Update Service (edgeupdate) Automatic (Delayed Start, Trigger Start) LocalSystem
PimIndexMaintenanceSvc_526cb Manual
Program Compatibility Assistant Service Automatic (Delayed Start, Trigger Start) LocalSystem
Touch Keyboard and Handwriting Panel Service Manual (Trigger Start) LocalSystem
UdkUserSvc_526cb Manual
UnistoreSvc_526cb Manual
UserDataSvc_526cb Manual
WpnUserService_526cb Automatic
Active Directory
Service Information
Global Settings
MaxNegPhaseCorrection 4,294,967,295
MaxPosPhaseCorrection 4,294,967,295
Client Settings
Enabled True
Server Settings
Enabled False
2 Support Provisions
Hardware Warranty Hardware Maintenance 9-5pm Mon-Fri 01 September 2022 01 September 2032
Relationship Information
Validity Period
Relationship Information
Validity Period
2 versions
1.01 TEST2022\sysadmin 02 September 2022 13:03 Added primary owner and hardware information.