STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2012/2012 R2 Domain Controller Security Technical Implementation Guide Version: 3 Release: 2 Benchmark Date: 04 May 2021:

Servers must have a host-based Intrusion Detection System.

DISA Rule

SV-226253r569184_rule

Vulnerability Number

V-226253

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

WN12-GE-000022

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Install a host-based Intrusion Detection System on each server.

Check Contents

Determine whether there is a host-based Intrusion Detection System on each server.

If the HIPS component of HBSS is installed and active on the host and the Alerts of blocked activity are being logged and monitored, this will meet the requirement of this finding.

A HID device is not required on a system that has the role as the Network Intrusion Device (NID). However, this exception needs to be documented with the site ISSO.

If a host-based Intrusion Detection System is not installed on the system, this is a finding.

Vulnerability Number

V-226253

Documentable

False

Rule Version

WN12-GE-000022

Severity Override Guidance

Determine whether there is a host-based Intrusion Detection System on each server.

If the HIPS component of HBSS is installed and active on the host and the Alerts of blocked activity are being logged and monitored, this will meet the requirement of this finding.

A HID device is not required on a system that has the role as the Network Intrusion Device (NID). However, this exception needs to be documented with the site ISSO.

If a host-based Intrusion Detection System is not installed on the system, this is a finding.

Check Content Reference

M

Target Key

4217

Comments