StigData/Processed/WindowsFirewall-All-1.6.xml
<DISASTIG id="Windows_Firewall" version="1.6" created="10/19/2017"> <ManualRule dscresourcemodule="None"> <Rule id="V-36440" severity="medium" conversionstatus="pass" title="Inbound Firewall Exception for Administration" dscresource="none"> <IsNullOrEmpty>False</IsNullOrEmpty> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>This requirement is NA for servers and non domain workstations. Verify firewall exceptions for inbound connections on domain workstations only allow authorized management systems and remote management hosts. Review inbound firewall exception rules in Windows Firewall with Advanced Security. Firewall rules can be complex and should be reviewed with the firewall administrator. One method for restricting inbound connections is to only allow exceptions for a specific scope of remote IP addresses. If allowed inbound exceptions are not limited to authorized management systems and remote management hosts, this is a finding.</rawString> </Rule> </ManualRule> <RegistryRule dscresourcemodule="PSDesiredStateConfiguration"> <Rule id="V-17415.a" severity="medium" conversionstatus="pass" title="Windows Firewall Domain - Enable Firewall" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ Type: REG_DWORD Value Name: EnableFirewall Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>EnableFirewall</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17415.b" severity="medium" conversionstatus="pass" title="Windows Firewall Domain - Enable Firewall" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\ Type: REG_DWORD Value Name: EnableFirewall Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>EnableFirewall</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17416.a" severity="medium" conversionstatus="pass" title="Windows Firewall Private - Enable Firewall" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\ Type: REG_DWORD Value Name: EnableFirewall Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>EnableFirewall</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17416.b" severity="medium" conversionstatus="pass" title="Windows Firewall Private - Enable Firewall" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\ Type: REG_DWORD Value Name: EnableFirewall Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>EnableFirewall</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17417.a" severity="medium" conversionstatus="pass" title="Windows Firewall Public - Enable Firewall" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\ Type: REG_DWORD Value Name: EnableFirewall Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>EnableFirewall</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17417.b" severity="medium" conversionstatus="pass" title="Windows Firewall Public - Enable Firewall" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\ Type: REG_DWORD Value Name: EnableFirewall Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>EnableFirewall</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17418.a" severity="high" conversionstatus="pass" title="Windows Firewall Domain - Inbound" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ Type: REG_DWORD Value Name: DefaultInboundAction Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>DefaultInboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17418.b" severity="high" conversionstatus="pass" title="Windows Firewall Domain - Inbound" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\ Type: REG_DWORD Value Name: DefaultInboundAction Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>DefaultInboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17419.a" severity="medium" conversionstatus="pass" title="Windows Firewall Domain - Outbound" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ Type: REG_DWORD Value Name: DefaultOutboundAction Value: 0x00000000 (0)</rawString> <ValueData>0</ValueData> <ValueName>DefaultOutboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17419.b" severity="medium" conversionstatus="pass" title="Windows Firewall Domain - Outbound" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\ Type: REG_DWORD Value Name: DefaultOutboundAction Value: 0x00000000 (0)</rawString> <ValueData>0</ValueData> <ValueName>DefaultOutboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17425.a" severity="low" conversionstatus="pass" title="Windows Firewall Domain - Log Size" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging</Key> <OrganizationValueRequired>True</OrganizationValueRequired> <OrganizationValueTestString>{0} -ge '16384'</OrganizationValueTestString> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging\ Type: REG_DWORD Value Name: LogFileSize Value: 0x00004000 (16384) (or greater)</rawString> <ValueData /> <ValueName>LogFileSize</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17425.b" severity="low" conversionstatus="pass" title="Windows Firewall Domain - Log Size" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging</Key> <OrganizationValueRequired>True</OrganizationValueRequired> <OrganizationValueTestString>{0} -ge '16384'</OrganizationValueTestString> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging\ Type: REG_DWORD Value Name: LogFileSize Value: 0x00004000 (16384) (or greater)</rawString> <ValueData /> <ValueName>LogFileSize</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17426.a" severity="low" conversionstatus="pass" title="Windows Firewall Domain - Log Dropped Packets" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging\ Type: REG_DWORD Value Name: LogDroppedPackets Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogDroppedPackets</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17426.b" severity="low" conversionstatus="pass" title="Windows Firewall Domain - Log Dropped Packets" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging\ Type: REG_DWORD Value Name: LogDroppedPackets Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogDroppedPackets</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17427.a" severity="low" conversionstatus="pass" title="Windows FW Domain - Log Successful Connections" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging\ Type: REG_DWORD Value Name: LogSuccessfulConnections Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogSuccessfulConnections</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17427.b" severity="low" conversionstatus="pass" title="Windows FW Domain - Log Successful Connections" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging\ Type: REG_DWORD Value Name: LogSuccessfulConnections Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogSuccessfulConnections</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17428.a" severity="high" conversionstatus="pass" title="Windows Firewall Private – Inbound" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\ Type: REG_DWORD Value Name: DefaultInboundAction Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>DefaultInboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17428.b" severity="high" conversionstatus="pass" title="Windows Firewall Private – Inbound" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\ Type: REG_DWORD Value Name: DefaultInboundAction Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>DefaultInboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17429.a" severity="medium" conversionstatus="pass" title="Windows Firewall Private - Outbound" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\ Type: REG_DWORD Value Name: DefaultOutboundAction Value: 0x00000000 (0)</rawString> <ValueData>0</ValueData> <ValueName>DefaultOutboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17429.b" severity="medium" conversionstatus="pass" title="Windows Firewall Private - Outbound" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\ Type: REG_DWORD Value Name: DefaultOutboundAction Value: 0x00000000 (0)</rawString> <ValueData>0</ValueData> <ValueName>DefaultOutboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17435.a" severity="low" conversionstatus="pass" title="Windows Firewall Private - Log Size" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging</Key> <OrganizationValueRequired>True</OrganizationValueRequired> <OrganizationValueTestString>{0} -ge '16384'</OrganizationValueTestString> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging\ Type: REG_DWORD Value Name: LogFileSize Value: 0x00004000 (16384) (or greater)</rawString> <ValueData /> <ValueName>LogFileSize</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17435.b" severity="low" conversionstatus="pass" title="Windows Firewall Private - Log Size" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging</Key> <OrganizationValueRequired>True</OrganizationValueRequired> <OrganizationValueTestString>{0} -ge '16384'</OrganizationValueTestString> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging\ Type: REG_DWORD Value Name: LogFileSize Value: 0x00004000 (16384) (or greater)</rawString> <ValueData /> <ValueName>LogFileSize</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17436.a" severity="low" conversionstatus="pass" title="Windows Firewall Private - Log Dropped Packets" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging\ Type: REG_DWORD Value Name: LogDroppedPackets Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogDroppedPackets</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17436.b" severity="low" conversionstatus="pass" title="Windows Firewall Private - Log Dropped Packets" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging\ Type: REG_DWORD Value Name: LogDroppedPackets Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogDroppedPackets</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17437.a" severity="low" conversionstatus="pass" title="Windows FW Private - Log Successful Connections" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging\ Type: REG_DWORD Value Name: LogSuccessfulConnections Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogSuccessfulConnections</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17437.b" severity="low" conversionstatus="pass" title="Windows FW Private - Log Successful Connections" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging\ Type: REG_DWORD Value Name: LogSuccessfulConnections Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogSuccessfulConnections</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17438.a" severity="high" conversionstatus="pass" title="Windows Firewall Public – Inbound " dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\ Type: REG_DWORD Value Name: DefaultInboundAction Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>DefaultInboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17438.b" severity="high" conversionstatus="pass" title="Windows Firewall Public – Inbound " dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\ Type: REG_DWORD Value Name: DefaultInboundAction Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>DefaultInboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17439.a" severity="medium" conversionstatus="pass" title="Windows Firewall Public - Outbound " dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\ Type: REG_DWORD Value Name: DefaultOutboundAction Value: 0x00000000 (0)</rawString> <ValueData>0</ValueData> <ValueName>DefaultOutboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17439.b" severity="medium" conversionstatus="pass" title="Windows Firewall Public - Outbound " dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\ Type: REG_DWORD Value Name: DefaultOutboundAction Value: 0x00000000 (0)</rawString> <ValueData>0</ValueData> <ValueName>DefaultOutboundAction</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17442" severity="medium" conversionstatus="pass" title="Windows Firewall Public - Local Firewall Rules" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>If the system is not a member of a domain, this is NA. If the firewall's Public Profile is not enabled (see V-17417), this requirement is also a finding. Verify the registry value below. If this registry value does not exist or is not configured as specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\ Value Name: AllowLocalPolicyMerge Type: REG_DWORD Value: 0x00000000 (0)</rawString> <ValueData>0</ValueData> <ValueName>AllowLocalPolicyMerge</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17443" severity="medium" conversionstatus="pass" title="Windows Firewall Public - Local Connection Rules" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>If the system is not a member of a domain, this is NA. If the firewall's Public Profile is not enabled (see V-17417), this requirement is also a finding. Verify the registry value below. If this registry value does not exist or is not configured as specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\ Value Name: AllowLocalIPsecPolicyMerge Type: REG_DWORD Value: 0x00000000 (0)</rawString> <ValueData>0</ValueData> <ValueName>AllowLocalIPsecPolicyMerge</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17445.a" severity="low" conversionstatus="pass" title="Windows Firewall Public - Log Size" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging</Key> <OrganizationValueRequired>True</OrganizationValueRequired> <OrganizationValueTestString>{0} -ge '16384'</OrganizationValueTestString> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging\ Type: REG_DWORD Value Name: LogFileSize Value: 0x00004000 (16384) (or greater)</rawString> <ValueData /> <ValueName>LogFileSize</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17445.b" severity="low" conversionstatus="pass" title="Windows Firewall Public - Log Size" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging</Key> <OrganizationValueRequired>True</OrganizationValueRequired> <OrganizationValueTestString>{0} -ge '16384'</OrganizationValueTestString> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging\ Type: REG_DWORD Value Name: LogFileSize Value: 0x00004000 (16384) (or greater)</rawString> <ValueData /> <ValueName>LogFileSize</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17446.a" severity="low" conversionstatus="pass" title="Windows Firewall Public - Log Dropped Packets" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging\ Type: REG_DWORD Value Name: LogDroppedPackets Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogDroppedPackets</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17446.b" severity="low" conversionstatus="pass" title="Windows Firewall Public - Log Dropped Packets" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging\ Type: REG_DWORD Value Name: LogDroppedPackets Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogDroppedPackets</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17447.a" severity="low" conversionstatus="pass" title="Windows FW Public - Log Successful Connections" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging\ Type: REG_DWORD Value Name: LogSuccessfulConnections Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogSuccessfulConnections</ValueName> <ValueType>Dword</ValueType> </Rule> <Rule id="V-17447.b" severity="low" conversionstatus="pass" title="Windows FW Public - Log Successful Connections" dscresource="Registry"> <Ensure>Present</Ensure> <IsNullOrEmpty>False</IsNullOrEmpty> <Key>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging</Key> <OrganizationValueRequired>False</OrganizationValueRequired> <OrganizationValueTestString /> <rawString>Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging\ Type: REG_DWORD Value Name: LogSuccessfulConnections Value: 0x00000001 (1)</rawString> <ValueData>1</ValueData> <ValueName>LogSuccessfulConnections</ValueName> <ValueType>Dword</ValueType> </Rule> </RegistryRule> </DISASTIG> |