Windows Server 2019 must have a host-based intrusion detection and prevention service installed.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-205851 | WN19-00-000120 | SV-205851r1186378_rule | CCI-000366 | medium |
| Description | ||||
| A properly configured Host-based Intrusion Detection System (HIDS) and Host-based Intrusion Prevention System (HIPS) provides another level of defense against unauthorized access to critical servers. With proper configuration and logging enabled, such a system can stop and/or alert for many attempts to gain unauthorized access to resources. | ||||
| STIG | Date | |||
| Microsoft Windows Server 2019 Security Technical Implementation Guide | 2026-02-12 | |||
Details
Check Text (C-205851r1186378_chk)
Determine if there is a HIDS and HIPS on each server.
A HIDS device is not required on a system that has the role as the Network Intrusion Device (NID). However, this exception needs to be documented with the information system security officer (ISSO).
If a HIDS and HIPS are not installed on the system, this is a finding.
Fix Text (F-6116r1186377_fix)
Install a HIDS and HIPS on each server.