Windows 10 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-268319WN10-CC-000063SV-268319r1081055_ruleCCI-000366medium
Description
Without Windows 10 systems being managed, devices could be rogue and become targets of an attacker.
STIGDate
Microsoft Windows 10 Security Technical Implementation Guide2025-02-25

Details

Check Text (C-268319r1081055_chk)

Verify the Windows 10 system is receiving policy from either Group Policy or an MDM with the following steps: From a command line or PowerShell: gpresult /R OS Configuration: Member Workstation If the system is not being managed by GPO, ask the administrator to indicate which MDM is managing the device. If the Window 10 system is not receiving policy from either Group Policy or an MDM, this is a finding. This is NA for standalone, nondomain joined systems.

Fix Text (F-72243r1028256_fix)

Configure the Windows 10 system to use either Group Policy or an approved MDM product to enforce STIG compliance.