UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Security configuration tools or equivalent processes must be used to configure and maintain platforms for security compliance.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1128 1.016 SV-29669r2_rule ECSC-1 Low
Description
Security configuration tools such as Group Policies and Security Templates allow system administrators to consolidate security-related system settings into a single configuration file. These settings can then be applied consistently to any number of Windows systems.
STIG Date
Windows 2008 Member Server Security Technical Implementation Guide 2015-06-03

Details

Check Text ( C-51985r1_chk )
Verify security configuration tools or equivalent processes are being used to configure Windows systems to meet security requirements. If security configuration tools or equivalent processes are not used, this is a finding.

Security configuration tools that are integrated into Windows, such as Group Policies and Security Templates, may be used to configure platforms for security compliance.

If an alternate method is used to configure a system (e.g., manually using the DISA Windows Security STIGs, etc.) and the same configured result is achieved, this is acceptable.
Fix Text (F-53867r1_fix)
Implement a process using security configuration tools or the equivalent to configure Windows systems to meet security requirements.