STIGQter STIGQter: STIG Summary: Windows Server 2008 R2 Member Server Security Technical Implementation Guide Version: 1 Release: 30 Benchmark Date: 26 Jul 2019: Windows will be prevented from using Windows Update to search for drivers.

DISA Rule

SV-32403r1_rule

Vulnerability Number

V-14261

Group Title

Windows Update Device Drive Searching

Rule Version

5.131

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication setting ‘Turn off Windows Update device driver searching’ to “Enabled”.

Check Contents

If the following registry value doesn’t exist or is not configured as specified, this is a finding:

Registry Hive: HKEY_LOCAL_MACHINE
Subkey: \Software\Policies\Microsoft\Windows\DriverSearching

Value Name: DontSearchWindowsUpdate

Type: REG_DWORD
Value: 1

Vulnerability Number

V-14261

Documentable

False

Rule Version

5.131

Severity Override Guidance

If the following registry value doesn’t exist or is not configured as specified, this is a finding:

Registry Hive: HKEY_LOCAL_MACHINE
Subkey: \Software\Policies\Microsoft\Windows\DriverSearching

Value Name: DontSearchWindowsUpdate

Type: REG_DWORD
Value: 1

Check Content Reference

M

Third-Party Tools

HK

Responsibility

System Administrator

Target Key

1823

Comments