Documented below are the results from a test run.
REM verify the status before hardening
inspec exec test\integration\default\default_spec.rb
REM perform hardening
REM note: although all recipes have been run in the below example, not everything is suitable and should be run with consideration in actual situations
cd recipes
for /f "usebackq tokens=* delims=" %i in (`dir /b`) do chef-apply "%i"
chef-apply "ciphers.rb"
chef-apply "core_hardening.rb"
chef-apply "deleteautologon.rb"
chef-apply "enable_firewall.rb"
chef-apply "enable_winrm.rb"
chef-apply "harden_ntlm.rb"
chef-apply "harden_winrm.rb"
chef-apply "schedule_task_update.rb"
chef-apply "windowsupdate.rb"
cd ..
REM verify the status before hardening
inspec exec test\integration\default\default_spec.rb
Note: Besides chef-apply schedule_task_update.rb
which was unsuccessful due to some possible credentials issue, all other commands were run successfully.
Microsoft Windows [Version 10.0.14393]
(c) 2016 Microsoft Corporation. All rights reserved.
C:\temp\windows_hardening>REM verify the status before hardening
C:\temp\windows_hardening>inspec exec test\integration\default\default_spec.rb
Profile: tests from test\integration\default\default_spec.rb (tests from test.integration.default.default_spec.rb)
Version: (not specified)
Target: local://
Registry Key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
[FAIL] PasswordExpiryWarning should eq 14
expected: 14
got: 5
(compared using ==)
[FAIL] ScreenSaverGracePeriod should eq "5"
expected: "5"
got: nil
(compared using ==)
[FAIL] AllocateDASD should eq "0"
expected: "0"
got: nil
(compared using ==)
[FAIL] ScRemoveOption should eq "1"
expected: "1"
got: "0"
(compared using ==)
[FAIL] CachedLogonsCount should eq "4"
expected: "4"
got: "10"
(compared using ==)
[FAIL] ForceUnlockLogon should eq 1
expected: 1
got: 0
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa
[PASS] FullPrivilegeAuditing should eq [0]
[PASS] AuditBaseObjects should eq 0
[FAIL] scenoapplylegacyauditpolicy should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] DisableDomainCreds should eq 1
expected: 1
got: 0
(compared using ==)
[PASS] LimitBlankPasswordUse should eq 1
[PASS] CrashOnAuditFail should eq 0
[PASS] RestrictAnonymousSAM should eq 1
[FAIL] RestrictAnonymous should eq 1
expected: 1
got: 0
(compared using ==)
[FAIL] SubmitControl should eq 0
expected: 0
got: nil
(compared using ==)
[PASS] ForceGuest should eq 0
[PASS] EveryoneIncludesAnonymous should eq 0
[PASS] NoLMHash should eq 1
[FAIL] SubmitControl should eq 0
expected: 0
got: nil
(compared using ==)
[FAIL] LmCompatibilityLevel should eq 5
expected: 5
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\pku2u
[FAIL] AllowOnlineID should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters
[PASS] MaximumPasswordAge should eq 30
[PASS] DisablePasswordChange should eq 0
[FAIL] RefusePasswordChange should eq 0
expected: 0
got: nil
(compared using ==)
[PASS] SealSecureChannel should eq 1
[PASS] RequireSignOrSeal should eq 1
[PASS] SignSecureChannel should eq 1
[PASS] RequireStrongKey should eq 1
[FAIL] RestrictNTLMInDomain should eq 7
expected: 7
got: nil
(compared using ==)
[FAIL] AuditNTLMInDomain should eq 7
expected: 7
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
[FAIL] DisableIPSourceRouting should eq 2
expected: 2
got: nil
(compared using ==)
[FAIL] TcpMaxDataRetransmissions should eq 3
expected: 3
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip6\Parameters
[FAIL] DisableIPSourceRouting should eq 2
expected: 2
got: nil
(compared using ==)
[FAIL] TcpMaxDataRetransmissions should eq 3
expected: 3
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit
[FAIL] ProcessCreationIncludeCmdLine_Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters
[FAIL] supportedencryptiontypes should eq 2147483644
expected: 2147483644
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System
[FAIL] ConsentPromptBehaviorUser should eq 0
expected: 0
got: 3
(compared using ==)
[PASS] EnableLUA should eq 1
[PASS] PromptOnSecureDesktop should eq 1
[FAIL] NoConnectedUser should eq 3
expected: 3
got: nil
(compared using ==)
[PASS] EnableVirtualization should eq 1
[PASS] EnableUIADesktopToggle should eq 0
[FAIL] ConsentPromptBehaviorAdmin should eq 2
expected: 2
got: 5
(compared using ==)
[PASS] EnableSecureUIAPaths should eq 1
[FAIL] FilterAdministratorToken should eq 1
expected: 1
got: 0
(compared using ==)
[FAIL] MaxDevicePasswordFailedAttempts should eq 10
expected: 10
got: nil
(compared using ==)
[FAIL] DontDisplayLastUserName should eq 1
expected: 1
got: 0
(compared using ==)
[FAIL] DontDisplayLockedUserId should eq 3
expected: 3
got: nil
(compared using ==)
[FAIL] InactivityTimeoutSecs should eq 900
expected: 900
got: nil
(compared using ==)
[PASS] EnableInstallerDetection should eq 1
[PASS] DisableCAD should eq 0
[PASS] ShutdownWithoutLogon should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters
[FAIL] enablesecuritysignature should eq 1
expected: 1
got: 0
(compared using ==)
[FAIL] requiresecuritysignature should eq 1
expected: 1
got: 0
(compared using ==)
[PASS] RestrictNullSessAccess should eq 1
[PASS] enableforcedlogoff should eq 1
[PASS] autodisconnect should eq 15
[FAIL] SMBServerNameHardeningLevel should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanWorkstation\Parameters
[FAIL] RequireSecuritySignature should eq 1
expected: 1
got: 0
(compared using ==)
[PASS] EnableSecuritySignature should eq 1
[PASS] EnablePlainTextPassword should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LDAP
[PASS] LDAPClientIntegrity should eq 1
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
[FAIL] LDAPServerIntegrity should eq 2
expected: 2
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager
[PASS] ProtectionMode should eq 1
[FAIL] SafeDllSearchMode should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\Defaults
[FAIL] IE should eq "*\\Internet Explorer\\iexplore.exe"
expected: "*\\Internet Explorer\\iexplore.exe"
got: nil
(compared using ==)
[FAIL] 7z should eq "*\\7-Zip\\7z.exe -EAF"
expected: "*\\7-Zip\\7z.exe -EAF"
got: nil
(compared using ==)
[FAIL] 7zFM should eq "*\\7-Zip\\7zFM.exe -EAF"
expected: "*\\7-Zip\\7zFM.exe -EAF"
got: nil
(compared using ==)
[FAIL] 7zGUI should eq "*\\7-Zip\\7zG.exe -EAF"
expected: "*\\7-Zip\\7zG.exe -EAF"
got: nil
(compared using ==)
[FAIL] Access should eq "*\\OFFICE1*\\MSACCESS.EXE"
expected: "*\\OFFICE1*\\MSACCESS.EXE"
got: nil
(compared using ==)
[FAIL] Acrobat should eq "*\\Adobe\\Acrobat*\\Acrobat\\Acrobat.exe"
expected: "*\\Adobe\\Acrobat*\\Acrobat\\Acrobat.exe"
got: nil
(compared using ==)
[FAIL] AcrobatReader should eq "*\\Adobe\\Reader*\\Reader\\AcroRd32.exe"
expected: "*\\Adobe\\Reader*\\Reader\\AcroRd32.exe"
got: nil
(compared using ==)
[FAIL] Chrome should eq "*\\Google\\Chrome\\Application\\chrome.exe -SEHOP"
expected: "*\\Google\\Chrome\\Application\\chrome.exe -SEHOP"
got: nil
(compared using ==)
[FAIL] Excel should eq "*\\OFFICE1*\\EXCEL.EXE"
expected: "*\\OFFICE1*\\EXCEL.EXE"
got: nil
(compared using ==)
[FAIL] Firefox should eq "*\\Mozilla Firefox\\firefox.exe"
expected: "*\\Mozilla Firefox\\firefox.exe"
got: nil
(compared using ==)
[FAIL] FirefoxPluginContainer should eq "*\\Mozilla Firefox\\plugin-container.exe"
expected: "*\\Mozilla Firefox\\plugin-container.exe"
got: nil
(compared using ==)
[FAIL] FoxitReader should eq "*\\Foxit Reader\\Foxit Reader.exe"
expected: "*\\Foxit Reader\\Foxit Reader.exe"
got: nil
(compared using ==)
[FAIL] GoogleTalk should eq "*\\Google\\Google Talk\\googletalk.exe -DEP -SEHOP"
expected: "*\\Google\\Google Talk\\googletalk.exe -DEP -SEHOP"
got: nil
(compared using ==)
[FAIL] InfoPath should eq "*\\OFFICE1*\\INFOPATH.EXE"
expected: "*\\OFFICE1*\\INFOPATH.EXE"
got: nil
(compared using ==)
[FAIL] iTunes should eq "*\\iTunes\\iTunes.exe"
expected: "*\\iTunes\\iTunes.exe"
got: nil
(compared using ==)
[FAIL] jre6_java should eq "*\\Java\\jre6\\bin\\java.exe -HeapSpray"
expected: "*\\Java\\jre6\\bin\\java.exe -HeapSpray"
got: nil
(compared using ==)
[FAIL] jre6_javaw should eq "*\\Java\\jre6\\bin\\javaw.exe -HeapSpray"
expected: "*\\Java\\jre6\\bin\\javaw.exe -HeapSpray"
got: nil
(compared using ==)
[FAIL] jre6_javaws should eq "*\\Java\\jre6\\bin\\javaws.exe -HeapSpray"
expected: "*\\Java\\jre6\\bin\\javaws.exe -HeapSpray"
got: nil
(compared using ==)
[FAIL] jre7_java should eq "*\\Java\\jre7\\bin\\java.exe -HeapSpray"
expected: "*\\Java\\jre7\\bin\\java.exe -HeapSpray"
got: nil
(compared using ==)
[FAIL] jre7_javaw should eq "*\\Java\\jre7\\bin\\javaw.exe -HeapSpray"
expected: "*\\Java\\jre7\\bin\\javaw.exe -HeapSpray"
got: nil
(compared using ==)
[FAIL] jre7_javaws should eq "*\\Java\\jre7\\bin\\javaws.exe -HeapSpray"
expected: "*\\Java\\jre7\\bin\\javaws.exe -HeapSpray"
got: nil
(compared using ==)
[FAIL] jre8_java should eq "*\\Java\\jre1.8*\\bin\\java.exe -HeapSpray"
expected: "*\\Java\\jre1.8*\\bin\\java.exe -HeapSpray"
got: nil
(compared using ==)
[FAIL] jre8_javaw should eq "*\\Java\\jre1.8*\\bin\\javaw.exe -HeapSpray"
expected: "*\\Java\\jre1.8*\\bin\\javaw.exe -HeapSpray"
got: nil
(compared using ==)
[FAIL] jre8_javaws should eq "*\\Java\\jre1.8*\\bin\\javaws.exe -HeapSpray"
expected: "*\\Java\\jre1.8*\\bin\\javaws.exe -HeapSpray"
got: nil
(compared using ==)
[FAIL] LiveWriter should eq "*\\Windows Live\\Writer\\WindowsLiveWriter.exe"
expected: "*\\Windows Live\\Writer\\WindowsLiveWriter.exe"
got: nil
(compared using ==)
[FAIL] Lync should eq "*\\OFFICE1*\\LYNC.EXE"
expected: "*\\OFFICE1*\\LYNC.EXE"
got: nil
(compared using ==)
[FAIL] LyncCommunicator should eq "*\\Microsoft Lync\\communicator.exe"
expected: "*\\Microsoft Lync\\communicator.exe"
got: nil
(compared using ==)
[FAIL] mIRC should eq "*\\mIRC\\mirc.exe"
expected: "*\\mIRC\\mirc.exe"
got: nil
(compared using ==)
[FAIL] Opera should eq "*\\Opera\\opera.exe"
expected: "*\\Opera\\opera.exe"
got: nil
(compared using ==)
[FAIL] Outlook should eq "*\\OFFICE1*\\OUTLOOK.EXE"
expected: "*\\OFFICE1*\\OUTLOOK.EXE"
got: nil
(compared using ==)
[FAIL] PhotoGallery should eq "*\\Windows Live\\Photo Gallery\\WLXPhotoGallery.exe"
expected: "*\\Windows Live\\Photo Gallery\\WLXPhotoGallery.exe"
got: nil
(compared using ==)
[FAIL] Photoshop should eq "*\\Adobe\\Adobe Photoshop CS*\\Photoshop.exe"
expected: "*\\Adobe\\Adobe Photoshop CS*\\Photoshop.exe"
got: nil
(compared using ==)
[FAIL] Picture Manager should eq "*\\OFFICE1*\\OIS.EXE"
expected: "*\\OFFICE1*\\OIS.EXE"
got: nil
(compared using ==)
[FAIL] Pidgin should eq "*\\Pidgin\\pidgin.exe"
expected: "*\\Pidgin\\pidgin.exe"
got: nil
(compared using ==)
[FAIL] PowerPoint should eq "*\\OFFICE1*\\POWERPNT.EXE"
expected: "*\\OFFICE1*\\POWERPNT.EXE"
got: nil
(compared using ==)
[FAIL] PPTViewer should eq "*\\OFFICE1*\\PPTVIEW.EXE"
expected: "*\\OFFICE1*\\PPTVIEW.EXE"
got: nil
(compared using ==)
[FAIL] Publisher should eq "*\\OFFICE1*\\MSPUB.EXE"
expected: "*\\OFFICE1*\\MSPUB.EXE"
got: nil
(compared using ==)
[FAIL] QuickTimePlayer should eq "*\\QuickTime\\QuickTimePlayer.exe"
expected: "*\\QuickTime\\QuickTimePlayer.exe"
got: nil
(compared using ==)
[FAIL] RealConverter should eq "*\\Real\\RealPlayer\\realconverter.exe"
expected: "*\\Real\\RealPlayer\\realconverter.exe"
got: nil
(compared using ==)
[FAIL] RealPlayer should eq "*\\Real\\RealPlayer\\realplay.exe"
expected: "*\\Real\\RealPlayer\\realplay.exe"
got: nil
(compared using ==)
[FAIL] Safari should eq "*\\Safari\\Safari.exe"
expected: "*\\Safari\\Safari.exe"
got: nil
(compared using ==)
[FAIL] SkyDrive should eq "*\\SkyDrive\\SkyDrive.exe"
expected: "*\\SkyDrive\\SkyDrive.exe"
got: nil
(compared using ==)
[FAIL] Skype should eq "*\\Skype\\Phone\\Skype.exe -EAF"
expected: "*\\Skype\\Phone\\Skype.exe -EAF"
got: nil
(compared using ==)
[FAIL] Thunderbird should eq "*\\Mozilla Thunderbird\\thunderbird.exe"
expected: "*\\Mozilla Thunderbird\\thunderbird.exe"
got: nil
(compared using ==)
[FAIL] ThunderbirdPluginContainer should eq "*\\Mozilla Thunderbird\\plugin-container.exe"
expected: "*\\Mozilla Thunderbird\\plugin-container.exe"
got: nil
(compared using ==)
[FAIL] UnRAR should eq "*\\WinRAR\\unrar.exe"
expected: "*\\WinRAR\\unrar.exe"
got: nil
(compared using ==)
[FAIL] Visio should eq "*\\OFFICE1*\\VISIO.EXE"
expected: "*\\OFFICE1*\\VISIO.EXE"
got: nil
(compared using ==)
[FAIL] VisioViewer should eq "*\\OFFICE1*\\VPREVIEW.EXE"
expected: "*\\OFFICE1*\\VPREVIEW.EXE"
got: nil
(compared using ==)
[FAIL] VLC should eq "*\\VideoLAN\\VLC\\vlc.exe"
expected: "*\\VideoLAN\\VLC\\vlc.exe"
got: nil
(compared using ==)
[FAIL] Winamp should eq "*\\Winamp\\winamp.exe"
expected: "*\\Winamp\\winamp.exe"
got: nil
(compared using ==)
[FAIL] WindowsLiveMail should eq "*\\Windows Live\\Mail\\wlmail.exe"
expected: "*\\Windows Live\\Mail\\wlmail.exe"
got: nil
(compared using ==)
[FAIL] WindowsMediaPlayer should eq "*\\Windows Media Player\\wmplayer.exe -SEHOP -EAF -MandatoryASLR"
expected: "*\\Windows Media Player\\wmplayer.exe -SEHOP -EAF -MandatoryASLR"
got: nil
(compared using ==)
[FAIL] WinRARConsole should eq "*\\WinRAR\\rar.exe"
expected: "*\\WinRAR\\rar.exe"
got: nil
(compared using ==)
[FAIL] WinRARGUI should eq "*\\WinRAR\\winrar.exe"
expected: "*\\WinRAR\\winrar.exe"
got: nil
(compared using ==)
[FAIL] WinZip should eq "*\\WinZip\\winzip32.exe"
expected: "*\\WinZip\\winzip32.exe"
got: nil
(compared using ==)
[FAIL] Winzip64 should eq "*\\WinZip\\winzip64.exe"
expected: "*\\WinZip\\winzip64.exe"
got: nil
(compared using ==)
[FAIL] Word should eq "*\\OFFICE1*\\WINWORD.EXE"
expected: "*\\OFFICE1*\\WINWORD.EXE"
got: nil
(compared using ==)
[FAIL] Wordpad should eq "*\\Windows NT\\Accessories\\wordpad.exe"
expected: "*\\Windows NT\\Accessories\\wordpad.exe"
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\SysSettings
[FAIL] DEP should eq 2
expected: 2
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Kernel
[PASS] ObCaseInsensitive should eq 1
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest
[FAIL] UseLogonCredential should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management
[FAIL] ClearPageFileAtShutdown should eq 1
expected: 1
got: 0
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole
[PASS] setcommand should eq 0
[PASS] securitylevel should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\Security
[FAIL] WarningLevel should eq 90
expected: 90
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Cryptography
[FAIL] ForceKeyProtection should eq 2
expected: 2
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Providers\LanMan Print Services\Servers
[PASS] AddPrinterDrivers should eq 1
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
[PASS] authenticodeenabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedPaths
[PASS] Machine should include /(System\\CurrentControlSet\\Control\\Print\\Printers)/
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedExactPaths
[PASS] Machine should include /(System\\CurrentControlSet\\Control\\ProductOptions)/
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM\Service\WinRS
[FAIL] AllowRemoteShellAccess should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SearchCompanion
[FAIL] DisableContentFileUpdates should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SQMClient\Windows
[FAIL] CEIPEnable should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Settings\AllowYourAccount
[FAIL] value should eq 0
expected: 0
got: 1
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsStore
[FAIL] AutoDownload should eq 4
expected: 4
got: nil
(compared using ==)
[FAIL] DisableOSUpgrade should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System
[FAIL] DontDisplayNetworkSelectionUI should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] DontEnumerateConnectedUsers should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] EnumerateLocalUsers should eq 0
expected: 0
got: nil
(compared using ==)
[FAIL] DisableLockScreenAppNotifications should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] AllowDomainPINLogon should eq 0
expected: 0
got: nil
(compared using ==)
[FAIL] EnableSmartScreen should eq 2
expected: 2
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting
[FAIL] AutoApproveOSDumps should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\Consent
[FAIL] DefaultConsent should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Installer
[FAIL] AlwaysInstallElevated should eq 0
expected: 0
got: nil
(compared using ==)
[FAIL] EnableUserControl should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\SkyDrive
[FAIL] DisableFileSync should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Application
[FAIL] MaxSize should eq 32768
expected: 32768
got: nil
(compared using ==)
[FAIL] Retention should eq "0"
expected: "0"
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Security
[FAIL] MaxSize should eq 196608
expected: 196608
got: nil
(compared using ==)
[FAIL] Retention should eq "0"
expected: "0"
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\System
[FAIL] MaxSize should eq 32768
expected: 32768
got: nil
(compared using ==)
[FAIL] Retention should eq "0"
expected: "0"
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Setup
[FAIL] MaxSize should eq 32768
expected: 32768
got: nil
(compared using ==)
[FAIL] Retention should eq "0"
expected: "0"
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
[FAIL] NoDriveTypeAutoRun should eq 255
expected: 255
got: nil
(compared using ==)
[FAIL] NoPublishingWizard should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] NoAutorun should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] PreXPSP2ShellProtocolBehavior should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
[FAIL] MinEncryptionLevel should eq 3
expected: 3
got: nil
(compared using ==)
[FAIL] fAllowUnsolicited should eq 0
expected: 0
got: nil
(compared using ==)
[FAIL] DeleteTempDirsOnExit should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] DisablePasswordSaving should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] fPromptForPassword should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] fAllowToGetHelp should eq 0
expected: 0
got: nil
(compared using ==)
[FAIL] fDisableCdm should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] fEncryptRPCTraffic should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] PerSessionTempDir should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search
[FAIL] AllowIndexingEncryptedStoresOrItems should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Personalization
[FAIL] NoLockScreenSlideshow should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] NoLockScreenCamera should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Messenger\Client
[FAIL] CEIP should eq 2
expected: 2
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\DriverSearching
[FAIL] DontSearchWindowsUpdate should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging
[FAIL] EnableScriptBlockLogging should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription
[FAIL] EnableTranscripting should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CredUI
[FAIL] DisablePasswordReveal should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] EnumerateAdministrators should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NetBT\Parameters
[FAIL] nonamereleaseondemand should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Network Connections
[FAIL] NC_StdDomainUserSetLocation should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] NC_AllowNetBridge_NLA should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths
[FAIL] \\*\NETLOGON should eq "RequireMutualAuthentication=1,RequireIntegrity=1"
expected: "RequireMutualAuthentication=1,RequireIntegrity=1"
got: nil
(compared using ==)
[FAIL] \\*\SYSVOL should eq "RequireMutualAuthentication=1,RequireIntegrity=1"
expected: "RequireMutualAuthentication=1,RequireIntegrity=1"
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WcmSvc\GroupPolicy
[FAIL] fMinimizeConnections should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.0\Server
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Client
[FAIL] DisabledByDefault should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Server
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\PCT 1.0\Server
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 2.0\Server
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\DES 56/56
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\NULL
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 40/128
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 56/128
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 56/128
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 64/128
[FAIL] Enabled should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Explorer
[FAIL] NoAutoplayfornonVolume should eq 1
expected: 1
got: nil
(compared using ==)
[FAIL] NoDataExecutionPrevention should eq 0
expected: 0
got: nil
(compared using ==)
[FAIL] NoHeapTerminationOnCorruption should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}
[FAIL] NoBackgroundPolicy should eq 0
expected: 0
got: nil
(compared using ==)
[FAIL] NoGPOListChanges should eq 0
expected: 0
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\EarlyLaunch
[FAIL] DriverLoadPolicy should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Rpc
[FAIL] EnableAuthEpResolution should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Feeds
[FAIL] DisableEnclosureDownload should eq 1
expected: 1
got: nil
(compared using ==)
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
[FAIL] NoAutoRebootWithLoggedOnUsers should eq 0
expected: 0
got: nil
(compared using ==)
Powershell
[FAIL] stdout should eq "MinimumPasswordAge = 1\r\nMaximumPasswordAge = 42\r\nMinimumPasswordLength = 14\r\nPasswordComplexit...2-546\r\nSeDenyServiceLogonRight = *S-1-5-32-546\r\nSeDenyInteractiveLogonRight = *S-1-5-32-546\r\n"
expected: "MinimumPasswordAge = 1\r\nMaximumPasswordAge = 42\r\nMinimumPasswordLength = 14\r\nPasswordComplexit...2-546\r\nSeDenyServiceLogonRight = *S-1-5-32-546\r\nSeDenyInteractiveLogonRight = *S-1-5-32-546\r\n"
got: "MaximumPasswordAge = 42\r\nSeServiceLogonRight = *S-1-5-80-0\r\nSeInteractiveLogonRight = *S-1-5-32-...\nSeShutdownPrivilege = *S-1-5-32-544,*S-1-5-32-551\r\nSeTakeOwnershipPrivilege = *S-1-5-32-544\r\n"
(compared using ==)
Diff:
@@ -1,23 +1,11 @@
-MinimumPasswordAge = 1
MaximumPasswordAge = 42
-MinimumPasswordLength = 14
-PasswordComplexity = 1
-PasswordHistorySize = 24
-LockoutBadCount = 10
-ResetLockoutCount = 15
-LockoutDuration = 15
-SeNetworkLogonRight = *S-1-5-11,*S-1-5-32-544
SeServiceLogonRight = *S-1-5-80-0
-SeInteractiveLogonRight = *S-1-5-32-544
+SeInteractiveLogonRight = *S-1-5-32-544,*S-1-5-32-545,*S-1-5-32-551
SeSecurityPrivilege = *S-1-5-32-544
SeSystemEnvironmentPrivilege = *S-1-5-32-544
SeProfileSingleProcessPrivilege = *S-1-5-32-544
SeAssignPrimaryTokenPrivilege = *S-1-5-19,*S-1-5-20
-SeRestorePrivilege = *S-1-5-32-544
-SeShutdownPrivilege = *S-1-5-32-544
+SeRestorePrivilege = *S-1-5-32-544,*S-1-5-32-551
+SeShutdownPrivilege = *S-1-5-32-544,*S-1-5-32-551
SeTakeOwnershipPrivilege = *S-1-5-32-544
-SeDenyNetworkLogonRight = *S-1-5-32-546
-SeDenyBatchLogonRight = *S-1-5-32-546
-SeDenyServiceLogonRight = *S-1-5-32-546
-SeDenyInteractiveLogonRight = *S-1-5-32-546
[PASS] stderr should eq ""
Test Summary: 38 successful, 175 failures, 0 skipped
C:\temp\windows_hardening>cd recipes
C:\temp\windows_hardening>REM perform hardening
C:\temp\windows_hardening>REM note: although all recipes have been run in the below example, not everything is suitable and should be run with consideration in actual situations
C:\temp\windows_hardening\recipes>for /f "usebackq tokens=* delims=" %i in (`dir /b`) do chef-apply "%i"
C:\temp\windows_hardening\recipes>chef-apply "ciphers.rb"
Recipe: (chef-apply cookbook)::(chef-apply recipe)
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.0\Server] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.0\Server - set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server - set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\PCT 1.0\Server] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\PCT 1.0\Server - set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 2.0\Server] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 2.0\Server - set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Client] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Client - set value {:name=>"DisabledByDefault", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Server] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Server - set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\DES 56/56] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\DES 56/56
- set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\NULL] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\NULL
- set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 40/128] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 40/128
- set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 56/128] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 56/128
- set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128
- set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 56/128] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 56/128
- set value {:name=>"Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 64/128] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 64/128
- set value {:name=>"Enabled", :type=>:dword, :data=>0}
C:\temp\windows_hardening\recipes>chef-apply "core_hardening.rb"
Recipe: (chef-apply cookbook)::(chef-apply recipe)
* registry_key[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] action create
- set value {:name=>"PasswordExpiryWarning", :type=>:dword, :data=>14}
- set value {:name=>"ScreenSaverGracePeriod", :type=>:string, :data=>5}
- set value {:name=>"AllocateDASD", :type=>:string, :data=>0}
- set value {:name=>"ScRemoveOption", :type=>:string, :data=>1}
- set value {:name=>"ForceUnlockLogon", :type=>:dword, :data=>1}
- set value {:name=>"AutoAdminLogon", :type=>:string, :data=>0}
- set value {:name=>"CachedLogonsCount", :type=>:string, :data=>4}
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa] action create
- set value {:name=>"scenoapplylegacyauditpolicy", :type=>:dword, :data=>1}
- set value {:name=>"DisableDomainCreds", :type=>:dword, :data=>1}
- set value {:name=>"RestrictAnonymous", :type=>:dword, :data=>1}
- set value {:name=>"SubmitControl", :type=>:dword, :data=>0}
- set value {:name=>"SubmitControl", :type=>:dword, :data=>0}
- set value {:name=>"LmCompatibilityLevel", :type=>:dword, :data=>5}
* powershell_script[fullprivilegeauditing] action run
- execute "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -InputFormat None -File "C:/Users/ADMINI~1/AppData/Local/Temp/2/chef-script20191107-1744-t71xf9.ps1"
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\pku2u] action create
- create key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\pku2u
- set value {:name=>"AllowOnlineID", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy] action create (up to date) * registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters] action create
- set value {:name=>"RefusePasswordChange", :type=>:dword, :data=>0}
- set value {:name=>"RestrictNTLMInDomain", :type=>:dword, :data=>7}
- set value {:name=>"AuditNTLMInDomain", :type=>:dword, :data=>7}
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NetBT\Parameters] action create
- set value {:name=>"nonamereleaseondemand", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters] action create
- set value {:name=>"DisableIPSourceRouting", :type=>:dword, :data=>2}
- set value {:name=>"TcpMaxDataRetransmissions", :type=>:dword, :data=>3}
- set value {:name=>"EnableICMPRedirect", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip6\Parameters] action create
- set value {:name=>"DisableIPSourceRouting", :type=>:dword, :data=>2}
- set value {:name=>"TcpMaxDataRetransmissions", :type=>:dword, :data=>3}
* registry_key[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System] action create
- set value {:name=>"ConsentPromptBehaviorUser", :type=>:dword, :data=>0}
- set value {:name=>"LocalAccountTokenFilterPolicy", :type=>:dword, :data=>1}
- set value {:name=>"MSAOptional", :type=>:dword, :data=>1}
- set value {:name=>"NoConnectedUser", :type=>:dword, :data=>3}
- set value {:name=>"ConsentPromptBehaviorAdmin", :type=>:dword, :data=>2}
- set value {:name=>"FilterAdministratorToken", :type=>:dword, :data=>1}
- set value {:name=>"MaxDevicePasswordFailedAttempts", :type=>:dword, :data=>10}
- set value {:name=>"DontDisplayLastUserName", :type=>:dword, :data=>1}
- set value {:name=>"DontDisplayLockedUserId", :type=>:dword, :data=>3}
- set value {:name=>"InactivityTimeoutSecs", :type=>:dword, :data=>900}
- set value {:name=>"legalnoticecaption", :type=>:string, :data=>"Company Logon Warning"}
- set value {:name=>"legalnoticetext", :type=>:string, :data=>"Warning text goes here..."}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters
- set value {:name=>"supportedencryptiontypes", :type=>:dword, :data=>2147483644}
* registry_key[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit] action create
- set value {:name=>"ProcessCreationIncludeCmdLine_Enabled", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters] action create
- set value {:name=>"enablesecuritysignature", :type=>:dword, :data=>1}
- set value {:name=>"requiresecuritysignature", :type=>:dword, :data=>1}
- set value {:name=>"SMBServerNameHardeningLevel", :type=>:dword, :data=>1}
* powershell_script[nullsessions] action run
- execute "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -InputFormat None -File "C:/Users/ADMINI~1/AppData/Local/Temp/2/chef-script20191107-1744-1r9wfm7.ps1"
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanWorkstation\Parameters] action create
- set value {:name=>"RequireSecuritySignature", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Providers\LanMan Print Services\Servers] action create (up to date)
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LDAP] action create (up to date)
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters] action create
- create key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
- set value {:name=>"LDAPServerIntegrity", :type=>:dword, :data=>2}
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager] action create
- set value {:name=>"SafeDllSearchMode", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Network Connections] action create
- set value {:name=>"NC_StdDomainUserSetLocation", :type=>:dword, :data=>1}
- set value {:name=>"NC_AllowNetBridge_NLA", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\Defaults] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\Defaults
- set value {:name=>"IE", :type=>:string, :data=>"*\\Internet Explorer\\iexplore.exe"}
- set value {:name=>"7z", :type=>:string, :data=>"*\\7-Zip\\7z.exe -EAF"}
- set value {:name=>"7zFM", :type=>:string, :data=>"*\\7-Zip\\7zFM.exe -EAF"}
- set value {:name=>"7zGUI", :type=>:string, :data=>"*\\7-Zip\\7zG.exe -EAF"}
- set value {:name=>"Access", :type=>:string, :data=>"*\\OFFICE1*\\MSACCESS.EXE"}
- set value {:name=>"Acrobat", :type=>:string, :data=>"*\\Adobe\\Acrobat*\\Acrobat\\Acrobat.exe"}
- set value {:name=>"AcrobatReader", :type=>:string, :data=>"*\\Adobe\\Reader*\\Reader\\AcroRd32.exe"}
- set value {:name=>"Chrome", :type=>:string, :data=>"*\\Google\\Chrome\\Application\\chrome.exe -SEHOP"}
- set value {:name=>"Excel", :type=>:string, :data=>"*\\OFFICE1*\\EXCEL.EXE"}
- set value {:name=>"Firefox", :type=>:string, :data=>"*\\Mozilla Firefox\\firefox.exe"}
- set value {:name=>"FirefoxPluginContainer", :type=>:string, :data=>"*\\Mozilla Firefox\\plugin-container.exe"}
- set value {:name=>"FoxitReader", :type=>:string, :data=>"*\\Foxit Reader\\Foxit Reader.exe"}
- set value {:name=>"GoogleTalk", :type=>:string, :data=>"*\\Google\\Google Talk\\googletalk.exe -DEP -SEHOP"}
- set value {:name=>"InfoPath", :type=>:string, :data=>"*\\OFFICE1*\\INFOPATH.EXE"}
- set value {:name=>"iTunes", :type=>:string, :data=>"*\\iTunes\\iTunes.exe"}
- set value {:name=>"jre6_java", :type=>:string, :data=>"*\\Java\\jre6\\bin\\java.exe -HeapSpray"}
- set value {:name=>"jre6_javaw", :type=>:string, :data=>"*\\Java\\jre6\\bin\\javaw.exe -HeapSpray"}
- set value {:name=>"jre6_javaws", :type=>:string, :data=>"*\\Java\\jre6\\bin\\javaws.exe -HeapSpray"}
- set value {:name=>"jre7_java", :type=>:string, :data=>"*\\Java\\jre7\\bin\\java.exe -HeapSpray"}
- set value {:name=>"jre7_javaw", :type=>:string, :data=>"*\\Java\\jre7\\bin\\javaw.exe -HeapSpray"}
- set value {:name=>"jre7_javaws", :type=>:string, :data=>"*\\Java\\jre7\\bin\\javaws.exe -HeapSpray"}
- set value {:name=>"jre8_java", :type=>:string, :data=>"*\\Java\\jre1.8*\\bin\\java.exe -HeapSpray"}
- set value {:name=>"jre8_javaw", :type=>:string, :data=>"*\\Java\\jre1.8*\\bin\\javaw.exe -HeapSpray"}
- set value {:name=>"jre8_javaws", :type=>:string, :data=>"*\\Java\\jre1.8*\\bin\\javaws.exe -HeapSpray"}
- set value {:name=>"LiveWriter", :type=>:string, :data=>"*\\Windows Live\\Writer\\WindowsLiveWriter.exe"}
- set value {:name=>"Lync", :type=>:string, :data=>"*\\OFFICE1*\\LYNC.EXE"}
- set value {:name=>"LyncCommunicator", :type=>:string, :data=>"*\\Microsoft Lync\\communicator.exe"}
- set value {:name=>"mIRC", :type=>:string, :data=>"*\\mIRC\\mirc.exe"}
- set value {:name=>"Opera", :type=>:string, :data=>"*\\Opera\\opera.exe"}
- set value {:name=>"Outlook", :type=>:string, :data=>"*\\OFFICE1*\\OUTLOOK.EXE"}
- set value {:name=>"PhotoGallery", :type=>:string, :data=>"*\\Windows Live\\Photo Gallery\\WLXPhotoGallery.exe"}
- set value {:name=>"Photoshop", :type=>:string, :data=>"*\\Adobe\\Adobe Photoshop CS*\\Photoshop.exe"}
- set value {:name=>"Picture Manager", :type=>:string, :data=>"*\\OFFICE1*\\OIS.EXE"}
- set value {:name=>"Pidgin", :type=>:string, :data=>"*\\Pidgin\\pidgin.exe"}
- set value {:name=>"PowerPoint", :type=>:string, :data=>"*\\OFFICE1*\\POWERPNT.EXE"}
- set value {:name=>"PPTViewer", :type=>:string, :data=>"*\\OFFICE1*\\PPTVIEW.EXE"}
- set value {:name=>"Publisher", :type=>:string, :data=>"*\\OFFICE1*\\MSPUB.EXE"}
- set value {:name=>"QuickTimePlayer", :type=>:string, :data=>"*\\QuickTime\\QuickTimePlayer.exe"}
- set value {:name=>"RealConverter", :type=>:string, :data=>"*\\Real\\RealPlayer\\realconverter.exe"}
- set value {:name=>"RealPlayer", :type=>:string, :data=>"*\\Real\\RealPlayer\\realplay.exe"}
- set value {:name=>"Safari", :type=>:string, :data=>"*\\Safari\\Safari.exe"}
- set value {:name=>"SkyDrive", :type=>:string, :data=>"*\\SkyDrive\\SkyDrive.exe"}
- set value {:name=>"Skype", :type=>:string, :data=>"*\\Skype\\Phone\\Skype.exe -EAF"}
- set value {:name=>"Thunderbird", :type=>:string, :data=>"*\\Mozilla Thunderbird\\thunderbird.exe"}
- set value {:name=>"ThunderbirdPluginContainer", :type=>:string, :data=>"*\\Mozilla Thunderbird\\plugin-container.exe"}
- set value {:name=>"UnRAR", :type=>:string, :data=>"*\\WinRAR\\unrar.exe"}
- set value {:name=>"Visio", :type=>:string, :data=>"*\\OFFICE1*\\VISIO.EXE"}
- set value {:name=>"VisioViewer", :type=>:string, :data=>"*\\OFFICE1*\\VPREVIEW.EXE"}
- set value {:name=>"VLC", :type=>:string, :data=>"*\\VideoLAN\\VLC\\vlc.exe"}
- set value {:name=>"Winamp", :type=>:string, :data=>"*\\Winamp\\winamp.exe"}
- set value {:name=>"WindowsLiveMail", :type=>:string, :data=>"*\\Windows Live\\Mail\\wlmail.exe"}
- set value {:name=>"WindowsMediaPlayer", :type=>:string, :data=>"*\\Windows Media Player\\wmplayer.exe -SEHOP -EAF -MandatoryASLR"}
- set value {:name=>"WinRARConsole", :type=>:string, :data=>"*\\WinRAR\\rar.exe"}
- set value {:name=>"WinRARGUI", :type=>:string, :data=>"*\\WinRAR\\winrar.exe"}
- set value {:name=>"WinZip", :type=>:string, :data=>"*\\WinZip\\winzip32.exe"}
- set value {:name=>"Winzip64", :type=>:string, :data=>"*\\WinZip\\winzip64.exe"}
- set value {:name=>"Word", :type=>:string, :data=>"*\\OFFICE1*\\WINWORD.EXE"}
- set value {:name=>"Wordpad", :type=>:string, :data=>"*\\Windows NT\\Accessories\\wordpad.exe"}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\SysSettings] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\SysSettings
- set value {:name=>"DEP", :type=>:dword, :data=>2}
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Kernel] action create (up to date)
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Feeds] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Feeds
- set value {:name=>"DisableEnclosureDownload", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest] action create
- set value {:name=>"UseLogonCredential", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management] action create
- set value {:name=>"ClearPageFileAtShutdown", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole] action create (up to date)
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\Security] action create
- set value {:name=>"WarningLevel", :type=>:dword, :data=>90}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Cryptography] action create
- set value {:name=>"ForceKeyProtection", :type=>:dword, :data=>2}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers] action create (up to date)
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedPaths] action create (up to date)
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedExactPaths] action create (up to date)
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths] action create
- set value {:name=>"\\\\*\\NETLOGON", :type=>:string, :data=>"RequireMutualAuthentication=1,RequireIntegrity=1"}
- set value {:name=>"\\\\*\\SYSVOL", :type=>:string, :data=>"RequireMutualAuthentication=1,RequireIntegrity=1"}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WcmSvc\GroupPolicy] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WcmSvc\GroupPolicy
- set value {:name=>"fMinimizeConnections", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM\Service\WinRS] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM\Service\WinRS
- set value {:name=>"AllowRemoteShellAccess", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SearchCompanion] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SearchCompanion
- set value {:name=>"DisableContentFileUpdates", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SQMClient\Windows] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SQMClient\Windows
- set value {:name=>"CEIPEnable", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Settings\AllowYourAccount] action create
- set value {:name=>"value", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsStore] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsStore
- set value {:name=>"AutoDownload", :type=>:dword, :data=>4}
- set value {:name=>"DisableOSUpgrade", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System] action create
- set value {:name=>"DontDisplayNetworkSelectionUI", :type=>:dword, :data=>1}
- set value {:name=>"DontEnumerateConnectedUsers", :type=>:dword, :data=>1}
- set value {:name=>"EnumerateLocalUsers", :type=>:dword, :data=>0}
- set value {:name=>"DisableLockScreenAppNotifications", :type=>:dword, :data=>1}
- set value {:name=>"AllowDomainPINLogon", :type=>:dword, :data=>0}
- set value {:name=>"EnableSmartScreen", :type=>:dword, :data=>2}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting
- set value {:name=>"AutoApproveOSDumps", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\Consent] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\Consent
- set value {:name=>"DefaultConsent", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Installer] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Installer
- set value {:name=>"AlwaysInstallElevated", :type=>:dword, :data=>0}
- set value {:name=>"EnableUserControl", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Application] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Application
- set value {:name=>"MaxSize", :type=>:dword, :data=>32768}
- set value {:name=>"Retention", :type=>:string, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Security] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Security
- set value {:name=>"MaxSize", :type=>:dword, :data=>196608}
- set value {:name=>"Retention", :type=>:string, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\System] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\System
- set value {:name=>"MaxSize", :type=>:dword, :data=>32768}
- set value {:name=>"Retention", :type=>:string, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Setup] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Setup
- set value {:name=>"MaxSize", :type=>:dword, :data=>32768}
- set value {:name=>"Retention", :type=>:string, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] action create
- set value {:name=>"NoDriveTypeAutoRun", :type=>:dword, :data=>255}
- set value {:name=>"NoPublishingWizard", :type=>:dword, :data=>1}
- set value {:name=>"NoAutorun", :type=>:dword, :data=>1}
- set value {:name=>"PreXPSP2ShellProtocolBehavior", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Explorer] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Explorer
- set value {:name=>"NoAutoplayfornonVolume", :type=>:dword, :data=>1}
- set value {:name=>"NoDataExecutionPrevention", :type=>:dword, :data=>0}
- set value {:name=>"NoHeapTerminationOnCorruption", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}
- set value {:name=>"NoBackgroundPolicy", :type=>:dword, :data=>0}
- set value {:name=>"NoGPOListChanges", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search
- set value {:name=>"AllowIndexingEncryptedStoresOrItems", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Personalization] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Personalization
- set value {:name=>"NoLockScreenSlideshow", :type=>:dword, :data=>1}
- set value {:name=>"NoLockScreenCamera", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Messenger\Client] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Messenger\Client
- set value {:name=>"CEIP", :type=>:dword, :data=>2}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\DriverSearching] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\DriverSearching
- set value {:name=>"DontSearchWindowsUpdate", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging
- set value {:name=>"EnableScriptBlockLogging", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription
- set value {:name=>"EnableTranscripting", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CredUI] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CredUI
- set value {:name=>"DisablePasswordReveal", :type=>:dword, :data=>1}
- set value {:name=>"EnumerateAdministrators", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\SkyDrive] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\SkyDrive
- set value {:name=>"DisableFileSync", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\EarlyLaunch] action create
- create key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\EarlyLaunch
- set value {:name=>"DriverLoadPolicy", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Rpc] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Rpc
- set value {:name=>"EnableAuthEpResolution", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU] action create
- set value {:name=>"NoAutoRebootWithLoggedOnUsers", :type=>:dword, :data=>0}
* powershell_script[import] action run
- execute "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -InputFormat None -File "C:/Users/ADMINI~1/AppData/Local/Temp/2/chef-script20191107-1744-4ldbtm.ps1"
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services] action create
- set value {:name=>"MinEncryptionLevel", :type=>:dword, :data=>3}
- set value {:name=>"fAllowUnsolicited", :type=>:dword, :data=>0}
- set value {:name=>"fPromptForPassword", :type=>:dword, :data=>1}
- set value {:name=>"DeleteTempDirsOnExit", :type=>:dword, :data=>1}
- set value {:name=>"DisablePasswordSaving", :type=>:dword, :data=>1}
- set value {:name=>"fAllowToGetHelp", :type=>:dword, :data=>0}
- set value {:name=>"fDisableCdm", :type=>:dword, :data=>1}
- set value {:name=>"fEncryptRPCTraffic", :type=>:dword, :data=>1}
- set value {:name=>"PerSessionTempDir", :type=>:dword, :data=>1}
C:\temp\windows_hardening\recipes>chef-apply "deleteautologon.rb"
Recipe: (chef-apply cookbook)::(chef-apply recipe)
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] action create (up to date)
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] action delete (up to date)
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] action delete (up to date)
C:\temp\windows_hardening\recipes>chef-apply "enable_firewall.rb"
Recipe: (chef-apply cookbook)::(chef-apply recipe)
* powershell_script[firewall] action run
- execute "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -InputFormat None -File "C:/Users/ADMINI~1/AppData/Local/Temp/2/chef-script20191107-1268-169fkqr.ps1"
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
- set value {:name=>"DisableNotifications", :type=>:dword, :data=>1}
- set value {:name=>"AllowLocalPolicyMerge", :type=>:dword, :data=>1}
- set value {:name=>"AllowLocalIPsecPolicyMerge", :type=>:dword, :data=>1}
- set value {:name=>"EnableFirewall", :type=>:dword, :data=>1}
- set value {:name=>"DefaultOutboundAction", :type=>:dword, :data=>0}
- set value {:name=>"DefaultInboundAction", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging
- set value {:name=>"LogFilePath", :type=>:string, :data=>"%systemroot%\\system32\\logfiles\\firewall\\domainfw.log"}
- set value {:name=>"LogFileSize", :type=>:dword, :data=>16384}
- set value {:name=>"LogDroppedPackets", :type=>:dword, :data=>1}
- set value {:name=>"LogSuccessfulConnections", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
- set value {:name=>"DisableNotifications", :type=>:dword, :data=>1}
- set value {:name=>"AllowLocalPolicyMerge", :type=>:dword, :data=>1}
- set value {:name=>"AllowLocalIPsecPolicyMerge", :type=>:dword, :data=>1}
- set value {:name=>"EnableFirewall", :type=>:dword, :data=>1}
- set value {:name=>"DefaultOutboundAction", :type=>:dword, :data=>0}
- set value {:name=>"DefaultInboundAction", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging
- set value {:name=>"LogFilePath", :type=>:string, :data=>"%systemroot%\\system32\\logfiles\\firewall\\privatefw.log"}
- set value {:name=>"LogFileSize", :type=>:dword, :data=>16384}
- set value {:name=>"LogDroppedPackets", :type=>:dword, :data=>1}
- set value {:name=>"LogSuccessfulConnections", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
- set value {:name=>"DisableNotifications", :type=>:dword, :data=>0}
- set value {:name=>"AllowLocalPolicyMerge", :type=>:dword, :data=>1}
- set value {:name=>"AllowLocalIPsecPolicyMerge", :type=>:dword, :data=>1}
- set value {:name=>"EnableFirewall", :type=>:dword, :data=>1}
- set value {:name=>"DefaultOutboundAction", :type=>:dword, :data=>0}
- set value {:name=>"DefaultInboundAction", :type=>:dword, :data=>1}
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging] action create
- create key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging
- set value {:name=>"LogFilePath", :type=>:string, :data=>"%systemroot%\\system32\\logfiles\\firewall\\publicfw.log"}
- set value {:name=>"LogFileSize", :type=>:dword, :data=>16384}
- set value {:name=>"LogDroppedPackets", :type=>:dword, :data=>1}
- set value {:name=>"LogSuccessfulConnections", :type=>:dword, :data=>1}
C:\temp\windows_hardening\recipes>chef-apply "enable_winrm.rb"
Recipe: (chef-apply cookbook)::(chef-apply recipe)
* powershell_script[enableWinRM] action run
- execute "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -InputFormat None -File "C:/Users/ADMINI~1/AppData/Local/Temp/2/chef-script20191107-3688-lblqss.ps1"
C:\temp\windows_hardening\recipes>chef-apply "harden_ntlm.rb"
Recipe: (chef-apply cookbook)::(chef-apply recipe)
* registry_key[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\MSV1_0] action create
- set value {:name=>"RestrictReceivingNTLMTraffic", :type=>:dword, :data=>2}
- set value {:name=>"RestrictSendingNTLMTraffic", :type=>:dword, :data=>2}
- set value {:name=>"AuditReceivingNTLMTraffic", :type=>:dword, :data=>2}
- set value {:name=>"allownullsessionfallback", :type=>:dword, :data=>0}
- set value {:name=>"NTLMMinServerSec", :type=>:dword, :data=>537395200}
- set value {:name=>"NTLMMinClientSec", :type=>:dword, :data=>537395200}
C:\temp\windows_hardening\recipes>chef-apply "harden_winrm.rb"
Recipe: (chef-apply cookbook)::(chef-apply recipe)
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM\Service] action create
- set value {:name=>"AllowAutoConfig", :type=>:dword, :data=>2}
- set value {:name=>"IPv4Filter", :type=>:dword, :data=>2}
- set value {:name=>"DisableRunAs", :type=>:dword, :data=>2}
- set value {:name=>"AllowUnencryptedTraffic", :type=>:dword, :data=>0}
* registry_key[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM\Client] action create
- create key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM\Client
- set value {:name=>"AllowDigest", :type=>:dword, :data=>1}
- set value {:name=>"AllowBasic", :type=>:dword, :data=>0}
- set value {:name=>"AllowUnencryptedTraffic", :type=>:dword, :data=>0}
C:\temp\windows_hardening\recipes>chef-apply "schedule_task_update.rb"
Recipe: (chef-apply cookbook)::(chef-apply recipe)
* windows_task[windows_update] action create
================================================================================
Error executing action `create` on resource 'windows_task[windows_update]'
================================================================================
Win32::TaskScheduler::Error
---------------------------
register_task_definition: No mapping between account names and security IDs was done.
Resource Declaration:
---------------------
# In schedule_task_update.rb
16: windows_task 'windows_update' do
17: task_name 'WindowsUpdate'
18: user '_administrator'
19: password 'TechPassword12!'
20: force true
21: cwd 'C:\\temp\\windows_hardening\\files'
22: command 'windows_update.ps1'
23: run_level :highest
24: frequency :daily
25: start_time '03:00'
26: end
27:
Compiled Resource:
------------------
# Declared in schedule_task_update.rb:16:in `run_chef_recipe'
windows_task("windows_update") do
action [:create]
default_guard_interpreter :default
declared_type :windows_task
cookbook_name "(chef-apply cookbook)"
recipe_name "(chef-apply recipe)"
task_name "WindowsUpdate"
user "_administrator"
password "TechPassword12!"
force true
cwd "C:\\temp\\windows_hardening\\files"
command "windows_update.ps1"
run_level :highest
frequency :daily
start_time "03:00"
execution_time_limit 4320
password_required true
start_day "11/07/2019"
end
System Info:
------------
chef_version=15.4.45
platform=windows
platform_version=10.0.14393
ruby=ruby 2.6.5p114 (2019-10-01 revision 67812) [x64-mingw32]
program_name=C:/opscode/chef-workstation/bin/chef-apply
executable=C:/opscode/chef-workstation/bin/chef-apply
[2019-11-07T13:42:05-08:00] FATAL: Stacktrace dumped to C:/Users/Administrator/.chef/cache/chef-stacktrace.out
[2019-11-07T13:42:05-08:00] FATAL: Please provide the contents of the stacktrace.out file if you file a bug report
[2019-11-07T13:42:05-08:00] FATAL: Win32::TaskScheduler::Error: windows_task[windows_update] ((chef-apply cookbook)::(chef-apply recipe) line 16) had an error: Win32::TaskScheduler::Error: register_task_definition: No mapping between account names and security IDs was done.
C:\temp\windows_hardening\recipes>chef-apply "windowsupdate.rb"
Recipe: (chef-apply cookbook)::(chef-apply recipe)
* registry_key[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU] action create
- set value {:name=>"NoAutoUpdate", :type=>:dword, :data=>0}
- set value {:name=>"AUOptions", :type=>:dword, :data=>4}
- set value {:name=>"ScheduledInstallDay", :type=>:dword, :data=>0}
- set value {:name=>"ScheduledInstallTime", :type=>:dword, :data=>3}
C:\temp\windows_hardening\recipes>cd ..
C:\temp\windows_hardening>REM verify the status after hardening
C:\temp\windows_hardening>inspec exec test\integration\default\default_spec.rb
Profile: tests from test\integration\default\default_spec.rb (tests from test.integration.default.default_spec.rb)
Version: (not specified)
Target: local://
Registry Key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
[PASS] PasswordExpiryWarning should eq 14
[PASS] ScreenSaverGracePeriod should eq "5"
[PASS] AllocateDASD should eq "0"
[PASS] ScRemoveOption should eq "1"
[PASS] CachedLogonsCount should eq "4"
[PASS] ForceUnlockLogon should eq 1
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa
[PASS] FullPrivilegeAuditing should eq [0]
[PASS] AuditBaseObjects should eq 0
[PASS] scenoapplylegacyauditpolicy should eq 1
[PASS] DisableDomainCreds should eq 1
[PASS] LimitBlankPasswordUse should eq 1
[PASS] CrashOnAuditFail should eq 0
[PASS] RestrictAnonymousSAM should eq 1
[PASS] RestrictAnonymous should eq 1
[PASS] SubmitControl should eq 0
[PASS] ForceGuest should eq 0
[PASS] EveryoneIncludesAnonymous should eq 0
[PASS] NoLMHash should eq 1
[PASS] SubmitControl should eq 0
[PASS] LmCompatibilityLevel should eq 5
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\pku2u
[PASS] AllowOnlineID should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters
[PASS] MaximumPasswordAge should eq 30
[PASS] DisablePasswordChange should eq 0
[PASS] RefusePasswordChange should eq 0
[PASS] SealSecureChannel should eq 1
[PASS] RequireSignOrSeal should eq 1
[PASS] SignSecureChannel should eq 1
[PASS] RequireStrongKey should eq 1
[PASS] RestrictNTLMInDomain should eq 7
[PASS] AuditNTLMInDomain should eq 7
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
[PASS] DisableIPSourceRouting should eq 2
[PASS] TcpMaxDataRetransmissions should eq 3
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip6\Parameters
[PASS] DisableIPSourceRouting should eq 2
[PASS] TcpMaxDataRetransmissions should eq 3
Registry Key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit
[PASS] ProcessCreationIncludeCmdLine_Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters
[PASS] supportedencryptiontypes should eq 2147483644
Registry Key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System
[PASS] ConsentPromptBehaviorUser should eq 0
[PASS] EnableLUA should eq 1
[PASS] PromptOnSecureDesktop should eq 1
[PASS] NoConnectedUser should eq 3
[PASS] EnableVirtualization should eq 1
[PASS] EnableUIADesktopToggle should eq 0
[PASS] ConsentPromptBehaviorAdmin should eq 2
[PASS] EnableSecureUIAPaths should eq 1
[PASS] FilterAdministratorToken should eq 1
[PASS] MaxDevicePasswordFailedAttempts should eq 10
[PASS] DontDisplayLastUserName should eq 1
[PASS] DontDisplayLockedUserId should eq 3
[PASS] InactivityTimeoutSecs should eq 900
[PASS] EnableInstallerDetection should eq 1
[PASS] DisableCAD should eq 0
[PASS] ShutdownWithoutLogon should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters
[PASS] enablesecuritysignature should eq 1
[PASS] requiresecuritysignature should eq 1
[PASS] RestrictNullSessAccess should eq 1
[PASS] enableforcedlogoff should eq 1
[PASS] autodisconnect should eq 15
[PASS] SMBServerNameHardeningLevel should eq 1
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanWorkstation\Parameters
[PASS] RequireSecuritySignature should eq 1
[PASS] EnableSecuritySignature should eq 1
[PASS] EnablePlainTextPassword should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LDAP
[PASS] LDAPClientIntegrity should eq 1
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
[PASS] LDAPServerIntegrity should eq 2
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager
[PASS] ProtectionMode should eq 1
[PASS] SafeDllSearchMode should eq 1
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\Defaults
[PASS] IE should eq "*\\Internet Explorer\\iexplore.exe"
[PASS] 7z should eq "*\\7-Zip\\7z.exe -EAF"
[PASS] 7zFM should eq "*\\7-Zip\\7zFM.exe -EAF"
[PASS] 7zGUI should eq "*\\7-Zip\\7zG.exe -EAF"
[PASS] Access should eq "*\\OFFICE1*\\MSACCESS.EXE"
[PASS] Acrobat should eq "*\\Adobe\\Acrobat*\\Acrobat\\Acrobat.exe"
[PASS] AcrobatReader should eq "*\\Adobe\\Reader*\\Reader\\AcroRd32.exe"
[PASS] Chrome should eq "*\\Google\\Chrome\\Application\\chrome.exe -SEHOP"
[PASS] Excel should eq "*\\OFFICE1*\\EXCEL.EXE"
[PASS] Firefox should eq "*\\Mozilla Firefox\\firefox.exe"
[PASS] FirefoxPluginContainer should eq "*\\Mozilla Firefox\\plugin-container.exe"
[PASS] FoxitReader should eq "*\\Foxit Reader\\Foxit Reader.exe"
[PASS] GoogleTalk should eq "*\\Google\\Google Talk\\googletalk.exe -DEP -SEHOP"
[PASS] InfoPath should eq "*\\OFFICE1*\\INFOPATH.EXE"
[PASS] iTunes should eq "*\\iTunes\\iTunes.exe"
[PASS] jre6_java should eq "*\\Java\\jre6\\bin\\java.exe -HeapSpray"
[PASS] jre6_javaw should eq "*\\Java\\jre6\\bin\\javaw.exe -HeapSpray"
[PASS] jre6_javaws should eq "*\\Java\\jre6\\bin\\javaws.exe -HeapSpray"
[PASS] jre7_java should eq "*\\Java\\jre7\\bin\\java.exe -HeapSpray"
[PASS] jre7_javaw should eq "*\\Java\\jre7\\bin\\javaw.exe -HeapSpray"
[PASS] jre7_javaws should eq "*\\Java\\jre7\\bin\\javaws.exe -HeapSpray"
[PASS] jre8_java should eq "*\\Java\\jre1.8*\\bin\\java.exe -HeapSpray"
[PASS] jre8_javaw should eq "*\\Java\\jre1.8*\\bin\\javaw.exe -HeapSpray"
[PASS] jre8_javaws should eq "*\\Java\\jre1.8*\\bin\\javaws.exe -HeapSpray"
[PASS] LiveWriter should eq "*\\Windows Live\\Writer\\WindowsLiveWriter.exe"
[PASS] Lync should eq "*\\OFFICE1*\\LYNC.EXE"
[PASS] LyncCommunicator should eq "*\\Microsoft Lync\\communicator.exe"
[PASS] mIRC should eq "*\\mIRC\\mirc.exe"
[PASS] Opera should eq "*\\Opera\\opera.exe"
[PASS] Outlook should eq "*\\OFFICE1*\\OUTLOOK.EXE"
[PASS] PhotoGallery should eq "*\\Windows Live\\Photo Gallery\\WLXPhotoGallery.exe"
[PASS] Photoshop should eq "*\\Adobe\\Adobe Photoshop CS*\\Photoshop.exe"
[PASS] Picture Manager should eq "*\\OFFICE1*\\OIS.EXE"
[PASS] Pidgin should eq "*\\Pidgin\\pidgin.exe"
[PASS] PowerPoint should eq "*\\OFFICE1*\\POWERPNT.EXE"
[PASS] PPTViewer should eq "*\\OFFICE1*\\PPTVIEW.EXE"
[PASS] Publisher should eq "*\\OFFICE1*\\MSPUB.EXE"
[PASS] QuickTimePlayer should eq "*\\QuickTime\\QuickTimePlayer.exe"
[PASS] RealConverter should eq "*\\Real\\RealPlayer\\realconverter.exe"
[PASS] RealPlayer should eq "*\\Real\\RealPlayer\\realplay.exe"
[PASS] Safari should eq "*\\Safari\\Safari.exe"
[PASS] SkyDrive should eq "*\\SkyDrive\\SkyDrive.exe"
[PASS] Skype should eq "*\\Skype\\Phone\\Skype.exe -EAF"
[PASS] Thunderbird should eq "*\\Mozilla Thunderbird\\thunderbird.exe"
[PASS] ThunderbirdPluginContainer should eq "*\\Mozilla Thunderbird\\plugin-container.exe"
[PASS] UnRAR should eq "*\\WinRAR\\unrar.exe"
[PASS] Visio should eq "*\\OFFICE1*\\VISIO.EXE"
[PASS] VisioViewer should eq "*\\OFFICE1*\\VPREVIEW.EXE"
[PASS] VLC should eq "*\\VideoLAN\\VLC\\vlc.exe"
[PASS] Winamp should eq "*\\Winamp\\winamp.exe"
[PASS] WindowsLiveMail should eq "*\\Windows Live\\Mail\\wlmail.exe"
[PASS] WindowsMediaPlayer should eq "*\\Windows Media Player\\wmplayer.exe -SEHOP -EAF -MandatoryASLR"
[PASS] WinRARConsole should eq "*\\WinRAR\\rar.exe"
[PASS] WinRARGUI should eq "*\\WinRAR\\winrar.exe"
[PASS] WinZip should eq "*\\WinZip\\winzip32.exe"
[PASS] Winzip64 should eq "*\\WinZip\\winzip64.exe"
[PASS] Word should eq "*\\OFFICE1*\\WINWORD.EXE"
[PASS] Wordpad should eq "*\\Windows NT\\Accessories\\wordpad.exe"
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\SysSettings
[PASS] DEP should eq 2
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Kernel
[PASS] ObCaseInsensitive should eq 1
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest
[PASS] UseLogonCredential should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management
[PASS] ClearPageFileAtShutdown should eq 1
Registry Key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole
[PASS] setcommand should eq 0
[PASS] securitylevel should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\Security
[PASS] WarningLevel should eq 90
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Cryptography
[PASS] ForceKeyProtection should eq 2
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Providers\LanMan Print Services\Servers
[PASS] AddPrinterDrivers should eq 1
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
[PASS] authenticodeenabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedPaths
[PASS] Machine should include /(System\\CurrentControlSet\\Control\\Print\\Printers)/
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedExactPaths
[PASS] Machine should include /(System\\CurrentControlSet\\Control\\ProductOptions)/
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM\Service\WinRS
[PASS] AllowRemoteShellAccess should eq 1
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SearchCompanion
[PASS] DisableContentFileUpdates should eq 1
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SQMClient\Windows
[PASS] CEIPEnable should eq 0
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Settings\AllowYourAccount
[PASS] value should eq 0
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsStore
[PASS] AutoDownload should eq 4
[PASS] DisableOSUpgrade should eq 1
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System
[PASS] DontDisplayNetworkSelectionUI should eq 1
[PASS] DontEnumerateConnectedUsers should eq 1
[PASS] EnumerateLocalUsers should eq 0
[PASS] DisableLockScreenAppNotifications should eq 1
[PASS] AllowDomainPINLogon should eq 0
[PASS] EnableSmartScreen should eq 2
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting
[PASS] AutoApproveOSDumps should eq 0
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\Consent
[PASS] DefaultConsent should eq 1
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Installer
[PASS] AlwaysInstallElevated should eq 0
[PASS] EnableUserControl should eq 0
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\SkyDrive
[PASS] DisableFileSync should eq 1
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Application
[PASS] MaxSize should eq 32768
[PASS] Retention should eq "0"
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Security
[PASS] MaxSize should eq 196608
[PASS] Retention should eq "0"
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\System
[PASS] MaxSize should eq 32768
[PASS] Retention should eq "0"
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Setup
[PASS] MaxSize should eq 32768
[PASS] Retention should eq "0"
Registry Key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
[PASS] NoDriveTypeAutoRun should eq 255
[PASS] NoPublishingWizard should eq 1
[PASS] NoAutorun should eq 1
[PASS] PreXPSP2ShellProtocolBehavior should eq 0
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
[PASS] MinEncryptionLevel should eq 3
[PASS] fAllowUnsolicited should eq 0
[PASS] DeleteTempDirsOnExit should eq 1
[PASS] DisablePasswordSaving should eq 1
[PASS] fPromptForPassword should eq 1
[PASS] fAllowToGetHelp should eq 0
[PASS] fDisableCdm should eq 1
[PASS] fEncryptRPCTraffic should eq 1
[PASS] PerSessionTempDir should eq 1
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search
[PASS] AllowIndexingEncryptedStoresOrItems should eq 0
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Personalization
[PASS] NoLockScreenSlideshow should eq 1
[PASS] NoLockScreenCamera should eq 1
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Messenger\Client
[PASS] CEIP should eq 2
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\DriverSearching
[PASS] DontSearchWindowsUpdate should eq 1
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging
[PASS] EnableScriptBlockLogging should eq 0
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription
[PASS] EnableTranscripting should eq 0
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CredUI
[PASS] DisablePasswordReveal should eq 1
[PASS] EnumerateAdministrators should eq 0
Registry Key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NetBT\Parameters
[PASS] nonamereleaseondemand should eq 1
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Network Connections
[PASS] NC_StdDomainUserSetLocation should eq 1
[PASS] NC_AllowNetBridge_NLA should eq 0
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths
[PASS] \\*\NETLOGON should eq "RequireMutualAuthentication=1,RequireIntegrity=1"
[PASS] \\*\SYSVOL should eq "RequireMutualAuthentication=1,RequireIntegrity=1"
Registry Key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WcmSvc\GroupPolicy
[PASS] fMinimizeConnections should eq 1
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.0\Server
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Client
[PASS] DisabledByDefault should eq 1
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Server
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\PCT 1.0\Server
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 2.0\Server
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\DES 56/56
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\NULL
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 40/128
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 56/128
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 56/128
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 64/128
[PASS] Enabled should eq 0
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Explorer
[PASS] NoAutoplayfornonVolume should eq 1
[PASS] NoDataExecutionPrevention should eq 0
[PASS] NoHeapTerminationOnCorruption should eq 0
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}
[PASS] NoBackgroundPolicy should eq 0
[PASS] NoGPOListChanges should eq 0
Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\EarlyLaunch
[PASS] DriverLoadPolicy should eq 1
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Rpc
[PASS] EnableAuthEpResolution should eq 1
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Feeds
[PASS] DisableEnclosureDownload should eq 1
Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
[PASS] NoAutoRebootWithLoggedOnUsers should eq 0
Powershell
[PASS] stdout should eq "MinimumPasswordAge = 1\r\nMaximumPasswordAge = 42\r\nMinimumPasswordLength = 14\r\nPasswordComplexit...2-546\r\nSeDenyServiceLogonRight = *S-1-5-32-546\r\nSeDenyInteractiveLogonRight = *S-1-5-32-546\r\n"
[PASS] stderr should eq ""
Test Summary: 213 successful, 0 failures, 0 skipped
C:\temp\windows_hardening>