STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2012/2012 R2 Domain Controller Security Technical Implementation Guide Version: 3 Release: 2 Benchmark Date: 04 May 2021:

Domain controllers must have a PKI server certificate.

DISA Rule

SV-226264r569184_rule

Vulnerability Number

V-226264

Group Title

SRG-OS-000066-GPOS-00034

Rule Version

WN12-PK-000005-DC

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Obtain a server certificate for the domain controller.

Check Contents

Verify the domain controller has a PKI server certificate.

Run "mmc".
Select "Add/Remove Snap-in" from the File menu.
Select "Certificates" in the left pane and click the "Add >" button.
Select "Computer Account", click "Next".
Select the appropriate option for "Select the computer you want this snap-in to manage.", click "Finish".
Click "OK".
Select and expand the Certificates (Local Computer) entry in the left pane.
Select and expand the Personal entry in the left pane.
Select the Certificates entry in the left pane.

If no certificate for the domain controller exists in the right pane, this is a finding.

Vulnerability Number

V-226264

Documentable

False

Rule Version

WN12-PK-000005-DC

Severity Override Guidance

Verify the domain controller has a PKI server certificate.

Run "mmc".
Select "Add/Remove Snap-in" from the File menu.
Select "Certificates" in the left pane and click the "Add >" button.
Select "Computer Account", click "Next".
Select the appropriate option for "Select the computer you want this snap-in to manage.", click "Finish".
Click "OK".
Select and expand the Certificates (Local Computer) entry in the left pane.
Select and expand the Personal entry in the left pane.
Select the Certificates entry in the left pane.

If no certificate for the domain controller exists in the right pane, this is a finding.

Check Content Reference

M

Target Key

4217

Comments