Microsoft Windows 11 Security Technical Implementation Guide

Overview

VersionDateFinding Count (5)Downloads
Version 1, Release 52024-10-15CAT I (High): 2CAT II (Medium): 2CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Public

Finding IDSeverityTitleDescription
V-253270
LOWMEDIUMHIGH
Windows 11 must be configured to audit Logon/Logoff - Logon successes.Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises t...
V-253273
LOWMEDIUMHIGH
Windows 11 must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.Utilizing a whitelist approach allows only authorized software programs to execute. This prevents malware and unauthorized software from executing....
V-253274
LOWMEDIUMHIGH
Windows 11 must have Virtualization-based Security enabled.Virtualization-based Security (VBS) provides the platform for the many security features available in Windows 11. VBS uses the hypervisor to support s...
V-253271
LOWMEDIUMHIGH
Windows 11 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode.UEFI provides additional security features in comparison to legacy BIOS firmware, including Secure Boot. UEFI is required for Windows 11. Systems with...
V-253272
LOWMEDIUMHIGH
Windows 11 must have Secure Boot enabled.Secure Boot is a security standard that ensures systems boot using only software that is trusted. This prevents rootkits and other malware from loadin...