ID | Category | Name | Severity | Result | Recommended | TestResult | SeverityFinding |
1000 | Features | SMBv1 Support | Passed | Feature is not installed | | | |
1103 | Account Policies | Store passwords using reversible encryption | Passed | Configured security policy | | Passed | |
1101 | Account Policies | Account lockout duration | Passed | Account policy set | | Passed | |
1100 | Account Policies | Account lockout threshold | Passed | Account policy set | | Passed | |
1104 | Account Policies | Allow Administrator account lockout | Passed | Configured security policy | | Passed | |
1102 | Account Policies | Reset account lockout counter | Passed | Account policy set | | Passed | |
1200 | User Rights Assignment | Access this computer from the network | Passed | Configured system user right assignment | | Passed | |
1201 | User Rights Assignment | Allow log on locally | Passed | Configured system user right assignment | | Passed | |
1202 | User Rights Assignment | Debug programs | Passed | Configured system user right assignment | | Passed | |
1203 | User Rights Assignment | Deny access to this computer from the network | Passed | Configured system user right assignment | | Passed | |
1204 | User Rights Assignment | Deny log on as a batch job | Passed | Configured system user right assignment | | Passed | |
1205 | User Rights Assignment | Deny log on as a service | Passed | Configured system user right assignment | | Passed | |
1206 | User Rights Assignment | Deny log on through Remote Desktop Services | Passed | Configured system user right assignment | | Passed | |
1300 | Security Options | Accounts: Block Microsoft accounts | Passed | Registry value created/modified | | Passed | |
1301 | Security Options | Audit: Force audit policy subcategory settings to override audit policy category settings | Passed | Registry value created/modified | | Passed | |
1302 | Security Options | Interactive logon: Do not require CTRL+ALT+DEL | Passed | Registry value created/modified | | Passed | |
1303 | Security Options | Interactive logon: Don't display last signed-in | Passed | Registry value created/modified | | Passed | |
1304 | Security Options | Interactive logon: Don't display username at sign-in | Passed | Registry value created/modified | | Passed | |
1305 | Security Options | Microsoft network client: Digitally sign communications (always) | Passed | Registry value created/modified | | Passed | |
1306 | Security Options | Microsoft network client: Digitally sign communications (if server agrees) | Passed | Registry value created/modified | | Passed | |
1307 | Security Options | Microsoft network server: Digitally sign communications (always) | Passed | Registry value created/modified | | Passed | |
1308 | Security Options | Microsoft network server: Digitally sign communications (if client agrees) | Passed | Registry value created/modified | | Passed | |
1309 | Security Options | Network access: Do not allow anonymous enumeration of SAM accounts | Passed | Registry value created/modified | | Passed | |
1310 | Security Options | Network access: Do not allow anonymous enumeration of SAM accounts and shares | Passed | Registry value created/modified | | Passed | |
1311 | Security Options | Network access: Do not allow storage of passwords and credentials for network authentication | Passed | Registry value created/modified | | Passed | |
1324 | Security Options | Network access: Restrict anonymous access to Named Pipes and Shares | Passed | Registry value created/modified | | Passed | |
1325 | Security Options | Network access: Restrict clients allowed to make remote calls to SAM | Passed | Registry value created/modified | | Passed | |
1312 | Security Options | Network security: Allow LocalSystem NULL session fallback | Passed | Registry value created/modified | | Passed | |
1326 | Security Options | Network security: Do not store LAN Manager hash value on next password change | Passed | Registry value created/modified | | Passed | |
1313 | Security Options | Network security: LAN Manager authentication level | Passed | Registry value created/modified | | Passed | |
1314 | Security Options | Network security: LDAP client signing requirements | Passed | Registry value created/modified | | Passed | |
1315 | Security Options | Network security: Minimum session security for NTLM SSP based (including secure RPC) clients | Passed | Registry value created/modified | | Passed | |
1316 | Security Options | Network security: Minimum session security for NTLM SSP based (including secure RPC) servers | Passed | Registry value created/modified | | Passed | |
1317 | Security Options | Network security: Restrict NTLM: Audit Incoming NTLM Traffic | Passed | Registry value created/modified | | Passed | |
1318 | Security Options | Network security: Restrict NTLM: Audit NTLM authentication in this domain | Passed | Registry value created/modified | | Passed | |
1319 | Security Options | Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers | Passed | Registry value created/modified | | Passed | |
1320 | Security Options | Shutdown: Allow system to be shut down without having to log on | Passed | Registry value created/modified | | Passed | |
1321 | Security Options | User Account Control: Admin Approval Mode for the Built-in Administrator account | Passed | Registry value created/modified | | Passed | |
1322 | Security Options | User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode | Passed | Registry value created/modified | | Passed | |
1323 | Security Options | User Account Control: Behavior of the elevation prompt for standard users | Passed | Registry value created/modified | | Passed | |
1400 | Windows Firewall | EnableFirewall (Domain Profile, Policy) | Passed | Registry key created | | Passed | |
1400 | Windows Firewall | EnableFirewall (Domain Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1418 | Windows Firewall | EnableFirewall (Domain Profile) | Passed | Registry value created/modified | | Passed | |
1401 | Windows Firewall | Inbound Connections (Domain Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1419 | Windows Firewall | Inbound Connections (Domain Profile) | Passed | Registry value created/modified | | Passed | |
1402 | Windows Firewall | Outbound Connections (Domain Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1420 | Windows Firewall | Outbound Connections (Domain Profile) | Passed | Registry value created/modified | | Passed | |
1403 | Windows Firewall | Log size limit (Domain Profile, Policy) | Passed | Registry key created | | Passed | |
1403 | Windows Firewall | Log size limit (Domain Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1421 | Windows Firewall | Log size limit (Domain Profile) | Passed | Registry value created/modified | | Passed | |
1404 | Windows Firewall | Log dropped packets (Domain Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1422 | Windows Firewall | Log dropped packets (Domain Profile) | Passed | Registry value created/modified | | Passed | |
1405 | Windows Firewall | Log successful connections (Domain Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1423 | Windows Firewall | Log successful connections (Domain Profile) | Passed | Registry value created/modified | | Passed | |
1406 | Windows Firewall | EnableFirewall (Private Profile, Policy) | Passed | Registry key created | | Passed | |
1406 | Windows Firewall | EnableFirewall (Private Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1424 | Windows Firewall | EnableFirewall (Private Profile) | Passed | Registry value created/modified | | Passed | |
1407 | Windows Firewall | Inbound Connections (Private Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1425 | Windows Firewall | Inbound Connections (Private Profile) | Passed | Registry value created/modified | | Passed | |
1408 | Windows Firewall | Outbound Connections (Private Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1426 | Windows Firewall | Outbound Connections (Private Profile) | Passed | Registry value created/modified | | Passed | |
1409 | Windows Firewall | Log size limit (Private Profile, Policy) | Passed | Registry key created | | Passed | |
1409 | Windows Firewall | Log size limit (Private Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1427 | Windows Firewall | Log size limit (Private Profile) | Passed | Registry value created/modified | | Passed | |
1410 | Windows Firewall | Log dropped packets (Private Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1428 | Windows Firewall | Log dropped packets (Private Profile) | Passed | Registry value created/modified | | Passed | |
1411 | Windows Firewall | Log successful connections (Private Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1429 | Windows Firewall | Log successful connections (Private Profile) | Passed | Registry value created/modified | | Passed | |
1412 | Windows Firewall | EnableFirewall (Public Profile, Policy) | Passed | Registry key created | | Passed | |
1412 | Windows Firewall | EnableFirewall (Public Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1430 | Windows Firewall | EnableFirewall (Public Profile) | Passed | Registry value created/modified | | Passed | |
1413 | Windows Firewall | Inbound Connections (Public Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1431 | Windows Firewall | Inbound Connections (Public Profile) | Passed | Registry value created/modified | | Passed | |
1414 | Windows Firewall | Outbound Connections (Public Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1432 | Windows Firewall | Outbound Connections (Public Profile) | Passed | Registry value created/modified | | Passed | |
1415 | Windows Firewall | Log size limit (Public Profile, Policy) | Passed | Registry key created | | Passed | |
1415 | Windows Firewall | Log size limit (Public Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1433 | Windows Firewall | Log size limit (Public Profile) | Passed | Registry value created/modified | | Passed | |
1416 | Windows Firewall | Log dropped packets (Public Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1434 | Windows Firewall | Log dropped packets (Public Profile) | Passed | Registry value created/modified | | Passed | |
1417 | Windows Firewall | Log successful connections (Public Profile, Policy) | Passed | Registry value created/modified | | Passed | |
1435 | Windows Firewall | Log successful connections (Public Profile) | Passed | Registry value created/modified | | Passed | |
1500 | Advanced Audit Policy Configuration | Credential Validation | Passed | Audit policy set | | Passed | |
1501 | Advanced Audit Policy Configuration | Security Group Management | Passed | Audit policy set | | Passed | |
1502 | Advanced Audit Policy Configuration | User Account Management | Passed | Audit policy set | | Passed | |
1503 | Advanced Audit Policy Configuration | DPAPI Activity | Passed | Audit policy set | | Passed | |
1504 | Advanced Audit Policy Configuration | Plug and Play Events | Passed | Audit policy set | | Passed | |
1505 | Advanced Audit Policy Configuration | Process Creation | Passed | Audit policy set | | Passed | |
1506 | Advanced Audit Policy Configuration | Account Lockout | Passed | Audit policy set | | Passed | |
1507 | Advanced Audit Policy Configuration | Group Membership | Passed | Audit policy set | | Passed | |
1508 | Advanced Audit Policy Configuration | Logon | Passed | Audit policy set | | Passed | |
1509 | Advanced Audit Policy Configuration | Other Logon/Logoff Events | Passed | Audit policy set | | Passed | |
1510 | Advanced Audit Policy Configuration | Special Logon | Passed | Audit policy set | | Passed | |
1511 | Advanced Audit Policy Configuration | Detailed File Share | Passed | Audit policy set | | Passed | |
1512 | Advanced Audit Policy Configuration | File Share | Passed | Audit policy set | | Passed | |
1513 | Advanced Audit Policy Configuration | Kernel Object | Passed | Audit policy set | | Passed | |
1514 | Advanced Audit Policy Configuration | Other Object Access Events | Passed | Audit policy set | | Passed | |
1515 | Advanced Audit Policy Configuration | Removable Storage | Passed | Audit policy set | | Passed | |
1516 | Advanced Audit Policy Configuration | SAM | Passed | Audit policy set | | Passed | |
1517 | Advanced Audit Policy Configuration | Audit Policy Change | Passed | Audit policy set | | Passed | |
1518 | Advanced Audit Policy Configuration | Authentication Policy Change | Passed | Audit policy set | | Passed | |
1519 | Advanced Audit Policy Configuration | MPSSVC Rule-Level Policy Change | Passed | Audit policy set | | Passed | |
1520 | Advanced Audit Policy Configuration | Other Policy Change Events | Passed | Audit policy set | | Passed | |
1521 | Advanced Audit Policy Configuration | Sensitive Privilege Use | Passed | Audit policy set | | Passed | |
1522 | Advanced Audit Policy Configuration | Other System Events | Passed | Audit policy set | | Passed | |
1523 | Advanced Audit Policy Configuration | Security State Change | Passed | Audit policy set | | Passed | |
1524 | Advanced Audit Policy Configuration | Security System Extension | Passed | Audit policy set | | Passed | |
1525 | Advanced Audit Policy Configuration | System Integrity | Passed | Audit policy set | | Passed | |
1600 | Administrative Templates: Control Panel | Personalization: Prevent enabling lock screen camera | Passed | Registry key created | | Passed | |
1600 | Administrative Templates: Control Panel | Personalization: Prevent enabling lock screen camera | Passed | Registry value created/modified | | Passed | |
1601 | Administrative Templates: Network | DNS Client: Turn off multicast name resolution (LLMNR) | Passed | Registry key created | | Passed | |
1601 | Administrative Templates: Network | DNS Client: Turn off multicast name resolution (LLMNR) | Passed | Registry value created/modified | | Passed | |
1602 | Administrative Templates: Network | Lanman Workstation: Enable insecure guest logons | Passed | Registry key created | | Passed | |
1602 | Administrative Templates: Network | Lanman Workstation: Enable insecure guest logons | Passed | Registry value created/modified | | Passed | |
1603 | Administrative Templates: Network | Turn off Microsoft Peer-to-Peer Networking Services | Passed | Registry value created/modified | | Passed | |
1604 | Administrative Templates: Network | WLAN Settings: Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid services | Passed | Registry value created/modified | | Passed | |
2108 | Administrative Templates: PowerShellCore | Turn on PowerShell Module Logging | Passed | Registry key created | | Passed | |
2108 | Administrative Templates: PowerShellCore | Turn on PowerShell Module Logging | Passed | Registry value created/modified | | Passed | |
2109 | Administrative Templates: PowerShellCore | Turn on PowerShell Module Logging (PowerShell Policy) | Passed | Registry value created/modified | | Passed | |
2110 | Administrative Templates: PowerShellCore | Turn on PowerShell Module Logging - Module Names | Passed | Registry key created | | Passed | |
2110 | Administrative Templates: PowerShellCore | Turn on PowerShell Module Logging - Module Names | Passed | Registry value created/modified | | Passed | |
2111 | Administrative Templates: PowerShellCore | Turn on PowerShell Script Block Logging | Passed | Registry key created | | Passed | |
2111 | Administrative Templates: PowerShellCore | Turn on PowerShell Script Block Logging | Passed | Registry value created/modified | | Passed | |
2112 | Administrative Templates: PowerShellCore | Turn on PowerShell Script Block Logging (Invocation) | Passed | Registry value created/modified | | Passed | |
2113 | Administrative Templates: PowerShellCore | Turn on PowerShell Script Block Logging (PowerShell Policy) | Passed | Registry value created/modified | | Passed | |
2116 | Administrative Templates: PowerShellCore | Turn on PowerShell Transcription | Passed | Registry key created | | Passed | |
2116 | Administrative Templates: PowerShellCore | Turn on PowerShell Transcription | Passed | Registry value created/modified | | Passed | |
2114 | Administrative Templates: PowerShellCore | Turn on PowerShell Transcription (Invocation) | Passed | Registry value created/modified | | Passed | |
2115 | Administrative Templates: PowerShellCore | Turn on PowerShell Transcription (PowerShell Policy) | Passed | Registry value created/modified | | Passed | |
1772 | Administrative Templates: Printers | Configure Redirection Guard | Passed | Registry key created | | Passed | |
1772 | Administrative Templates: Printers | Configure Redirection Guard | Passed | Registry value created/modified | | Passed | |
1768 | Administrative Templates: Printers | Only use Package Point and Print (CVE-2021-36958) | Passed | Registry key created | | Passed | |
1768 | Administrative Templates: Printers | Only use Package Point and Print (CVE-2021-36958) | Passed | Registry value created/modified | | Passed | |
1769 | Administrative Templates: Printers | Package Point and Print - Approved servers (CVE-2021-36958) | Passed | Registry value created/modified | | Passed | |
1764 | Administrative Templates: Printers | Point and Print Restrictions: When installing drivers for a new connection (CVE-2021-34527) | Passed | Registry key created | | Passed | |
1764 | Administrative Templates: Printers | Point and Print Restrictions: When installing drivers for a new connection (CVE-2021-34527) | Passed | Registry value created/modified | | Passed | |
1765 | Administrative Templates: Printers | Point and Print Restrictions: When updating drivers for an existing connection (CVE-2021-34527) | Passed | Registry value created/modified | | Passed | |
1771 | Administrative Templates: Start Menu and Taskbar | Notifications: Turn off notifications network usage | Passed | Registry key created | | Passed | |
1771 | Administrative Templates: Start Menu and Taskbar | Notifications: Turn off notifications network usage | Passed | Registry value created/modified | | Passed | |
1605 | Administrative Templates: System | Credentials Delegation: Allow delegation default credentials | Passed | Registry key created | | Passed | |
1605 | Administrative Templates: System | Credentials Delegation: Allow delegation default credentials | Passed | Registry value created/modified | | Passed | |
1606 | Administrative Templates: System | Credentials Delegation: Encryption Oracle Remediation | Passed | Registry key created | | Passed | |
1606 | Administrative Templates: System | Credentials Delegation: Encryption Oracle Remediation | Passed | Registry value created/modified | | Passed | |
1699 | Administrative Templates: System | Credentials Delegation: Remote host allows delegation of non-exportable credentials | Passed | Registry value created/modified | | Passed | |
1607 | Administrative Templates: System | Device Installation: Device Installation Restrictions: Prevent installation of devices that match an ID | Passed | Registry key created | | Passed | |
1607 | Administrative Templates: System | Device Installation: Device Installation Restrictions: Prevent installation of devices that match an ID | Passed | Registry value created/modified | | Passed | |
1608 | Administrative Templates: System | Device Installation: Device Installation Restrictions: Prevent installation of devices that match an ID (Retroactive) | Passed | Registry value created/modified | | Passed | |
1609 | Administrative Templates: System | Device Installation: Device Installation Restrictions: Prevent installation of devices that match ID PCI\CC_0C0010 (Firewire) | Passed | Registry key created | | Passed | |
1609 | Administrative Templates: System | Device Installation: Device Installation Restrictions: Prevent installation of devices that match ID PCI\CC_0C0010 (Firewire) | Passed | Registry value created/modified | | Passed | |
1610 | Administrative Templates: System | Device Installation: Device Installation Restrictions: Prevent installation of devices that match ID PCI\CC_0C0A (Thunderbolt) | Passed | Registry value created/modified | | Passed | |
1611 | Administrative Templates: System | Device Installation: Device Installation Restrictions: Prevent installation of devices using drivers that match an device setup class | Passed | Registry value created/modified | | Passed | |
1612 | Administrative Templates: System | Device Installation: Device Installation Restrictions: Prevent installation of devices using drivers that match an device setup class (Retroactive) | Passed | Registry value created/modified | | Passed | |
1613 | Administrative Templates: System | Device Installation: Device Installation Restrictions: Prevent installation of devices using drivers that match d48179be-ec20-11d1-b6b8-00c04fa372a7 (SBP-2 drive) | Passed | Registry key created | | Passed | |
1613 | Administrative Templates: System | Device Installation: Device Installation Restrictions: Prevent installation of devices using drivers that match d48179be-ec20-11d1-b6b8-00c04fa372a7 (SBP-2 drive) | Passed | Registry value created/modified | | Passed | |
1623 | Administrative Templates: System | Device Guard: Require UEFI Memory Attributes Table (Policy) | Passed | Registry key created | | Passed | |
1623 | Administrative Templates: System | Device Guard: Require UEFI Memory Attributes Table (Policy) | Passed | Registry value created/modified | | Passed | |
1621 | Administrative Templates: System | Device Guard: Secure Launch Configuration (Policy) | Passed | Registry value created/modified | | Passed | |
1622 | Administrative Templates: System | Device Guard: Windows Defender Application Control deployed (Policy) | Passed | Registry value created/modified | | Passed | |
1630 | Administrative Templates: System | Early Launch Antimalware: Boot-Start Driver Initialization Policy | Passed | Registry key created | | Passed | |
1630 | Administrative Templates: System | Early Launch Antimalware: Boot-Start Driver Initialization Policy | Passed | Registry value created/modified | | Passed | |
1631 | Administrative Templates: System | Group Policy: Process even if the Group Policy objects have not changed | Passed | Registry key created | | Passed | |
1631 | Administrative Templates: System | Group Policy: Process even if the Group Policy objects have not changed | Passed | Registry value created/modified | | Passed | |
1632 | Administrative Templates: System | Group Policy: Do not apply during periodic background processing | Passed | Registry value created/modified | | Passed | |
1640 | Administrative Templates: System | Internet Communication Management: Internet Communication settings: Turn off the Windows Messenger Customer Experience Improvement Program | Passed | Registry key created | | Passed | |
1640 | Administrative Templates: System | Internet Communication Management: Internet Communication settings: Turn off the Windows Messenger Customer Experience Improvement Program | Passed | Registry value created/modified | | Passed | |
1641 | Administrative Templates: System | Internet Communication Management: Internet Communication settings: Turn off downloading of print drivers over HTTP | Passed | Registry value created/modified | | Passed | |
1642 | Administrative Templates: System | Internet Communication Management: Internet Communication settings: Turn off Windows Error Reporting 1 | Passed | Registry key created | | Passed | |
1642 | Administrative Templates: System | Internet Communication Management: Internet Communication settings: Turn off Windows Error Reporting 1 | Passed | Registry value created/modified | | Passed | |
1643 | Administrative Templates: System | Internet Communication Management: Internet Communication settings: Turn off Windows Error Reporting 2 | Passed | Registry value created/modified | | Passed | |
1644 | Administrative Templates: System | Internet Communication Management: Internet Communication settings: Turn off Internet download for Web publishing and online ordering wizards | Passed | Registry value created/modified | | Passed | |
1645 | Administrative Templates: System | Internet Communication Management: Internet Communication settings: Turn off Windows Customer Experience Improvement Program | Passed | Registry value created/modified | | Passed | |
1650 | Administrative Templates: System | Kernel DMA Protection: Enumeration policy for external devices incompatible with Kernel DMA Protection | Passed | Registry key created | | Passed | |
1650 | Administrative Templates: System | Kernel DMA Protection: Enumeration policy for external devices incompatible with Kernel DMA Protection | Passed | Registry value created/modified | | Passed | |
1660 | Administrative Templates: System | Logon: Turn on convenience PIN sign-in | Passed | Registry value created/modified | | Passed | |
1661 | Administrative Templates: System | Logon: Turn off app notifications on the lock screen | Passed | Registry value created/modified | | Passed | |
1662 | Administrative Templates: System | Logon: Do not display network selection UI | Passed | Registry value created/modified | | Passed | |
1670 | Administrative Templates: System | Mitigation Options: Untrusted Font Blocking | Passed | Registry key created | | Passed | |
1670 | Administrative Templates: System | Mitigation Options: Untrusted Font Blocking | Passed | Registry value created/modified | | Passed | |
1680 | Administrative Templates: System | OS Policies: Allow Clipboard synchronization across devices | Passed | Registry value created/modified | | Passed | |
1685 | Administrative Templates: System | Sleep Settings: Require a password when a computer wakes (plugged in) | Passed | Registry key created | | Passed | |
1685 | Administrative Templates: System | Sleep Settings: Require a password when a computer wakes (plugged in) | Passed | Registry value created/modified | | Passed | |
1686 | Administrative Templates: System | Sleep Settings: Require a password when a computer wakes (on battery) | Passed | Registry value created/modified | | Passed | |
1687 | Administrative Templates: System | Sleep Settings: Allow standby states (S1-S3) when sleeping (plugged in) | Passed | Registry key created | | Passed | |
1687 | Administrative Templates: System | Sleep Settings: Allow standby states (S1-S3) when sleeping (plugged in) | Passed | Registry value created/modified | | Passed | |
1688 | Administrative Templates: System | Sleep Settings: Allow standby states (S1-S3) when sleeping (on battery) | Passed | Registry value created/modified | | Passed | |
1690 | Administrative Templates: System | Remote Assistance: Configure Offer Remote Assistance | Passed | Registry value created/modified | | Passed | |
1691 | Administrative Templates: System | Remote Assistance: Configure Solicited Remote Assistance | Passed | Registry value created/modified | | Passed | |
1692 | Administrative Templates: System | Remote Procedure Call: Enable RPC Endpoint Mapper Client Authentication | Passed | Registry key created | | Passed | |
1692 | Administrative Templates: System | Remote Procedure Call: Enable RPC Endpoint Mapper Client Authentication | Passed | Registry value created/modified | | Passed | |
1693 | Administrative Templates: System | Remote Procedure Call: Restrict Unauthenticated RPC clients | Passed | Registry value created/modified | | Passed | |
1694 | Administrative Templates: System | Security Settings: Enable svchost.exe mitigation options | Passed | Registry value created/modified | | Passed | |
1695 | Administrative Templates: System | Windows Performance PerfTrack: Enable/Disable PerfTrack | Passed | Registry key created | | Passed | |
1695 | Administrative Templates: System | Windows Performance PerfTrack: Enable/Disable PerfTrack | Passed | Registry value created/modified | | Passed | |
1696 | Administrative Templates: System | User Profiles: Turn off the advertising ID | Passed | Registry key created | | Passed | |
1696 | Administrative Templates: System | User Profiles: Turn off the advertising ID | Passed | Registry value created/modified | | Passed | |
1697 | Administrative Templates: System | Time Providers: Enable Windows NTP Client | Passed | Registry key created | | Passed | |
1697 | Administrative Templates: System | Time Providers: Enable Windows NTP Client | Passed | Registry value created/modified | | Passed | |
1698 | Administrative Templates: System | Time Providers: Enable Windows NTP Server | Passed | Registry key created | | Passed | |
1698 | Administrative Templates: System | Time Providers: Enable Windows NTP Server | Passed | Registry value created/modified | | Passed | |
1700 | Administrative Templates: Windows Components | App Package Deployment: Allow a Windows app to share application data between users | Passed | Registry key created | | Passed | |
1700 | Administrative Templates: Windows Components | App Package Deployment: Allow a Windows app to share application data between users | Passed | Registry value created/modified | | Passed | |
1701 | Administrative Templates: Windows Components | App Privacy: Let Windows apps activate with voice while the system is locked | Passed | Registry key created | | Passed | |
1701 | Administrative Templates: Windows Components | App Privacy: Let Windows apps activate with voice while the system is locked | Passed | Registry value created/modified | | Passed | |
1702 | Administrative Templates: Windows Components | App runtime: Block launching Universal Windows apps with Windows Runtime API access from hosted content | Passed | Registry value created/modified | | Passed | |
1703 | Administrative Templates: Windows Components | Application Compatibility: Turn off Application Telemetry | Passed | Registry key created | | Passed | |
1703 | Administrative Templates: Windows Components | Application Compatibility: Turn off Application Telemetry | Passed | Registry value created/modified | | Passed | |
1704 | Administrative Templates: Windows Components | AutoPlay Policies: Turn off Autoplay | Passed | Registry value created/modified | | Passed | |
1705 | Administrative Templates: Windows Components | AutoPlay Policies: Disallow Autoplay for non-volume devices | Passed | Registry value created/modified | | Passed | |
1706 | Administrative Templates: Windows Components | AutoPlay Policies: Set the default behavior for AutoRun | Passed | Registry value created/modified | | Passed | |
1707 | Administrative Templates: Windows Components | Biometrics: Allow the use of biometrics | Passed | Registry key created | | Passed | |
1707 | Administrative Templates: Windows Components | Biometrics: Allow the use of biometrics | Passed | Registry value created/modified | | Passed | |
1773 | Administrative Templates: Windows Components | Biometrics: Facial Features: Configure enhanced anti-spoofing | Passed | Registry key created | | Passed | |
1773 | Administrative Templates: Windows Components | Biometrics: Facial Features: Configure enhanced anti-spoofing | Passed | Registry value created/modified | | Passed | |
1761 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Choose drive encryption method and cipher strength (for operating system drives) | Passed | Registry key created | | Passed | |
1761 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Choose drive encryption method and cipher strength (for operating system drives) | Passed | Registry value created/modified | | Passed | |
1709 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Disable new DMA devices when this computer is locked | Passed | Registry value created/modified | | Passed | |
1710 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Operating System Drives: Allow Secure Boot for integrity validation | Passed | Registry value created/modified | | Passed | |
1711 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup | Passed | Registry value created/modified | | Passed | |
1715 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Allow BitLocker without a compatible TPM | Passed | Registry value created/modified | | Passed | |
1716 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup | Passed | Registry value created/modified | | Passed | |
1717 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup PIN | Passed | Registry value created/modified | | Passed | |
1718 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup key | Passed | Registry value created/modified | | Passed | |
1719 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup key and PIN | Passed | Registry value created/modified | | Passed | |
1712 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Operating System Drives: Allow enhanced PINs for startup | Passed | Registry value created/modified | | Passed | |
1713 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Operating System Drives: Configure use of hardware-based encryption for operating system drives | Passed | Registry value created/modified | | Passed | |
1763 | Administrative Templates: Windows Components | BitLocker Drive Encryption: Operating System Drives: Configure minimum PIN length for startup | Passed | Registry value created/modified | | Passed | |
1720 | Administrative Templates: Windows Components | Cloud Content: Do not show Windows tips | Passed | Registry value created/modified | | Passed | |
1721 | Administrative Templates: Windows Components | Cloud Content: Turn off Microsoft consumer experiences | Passed | Registry value created/modified | | Passed | |
1722 | Administrative Templates: Windows Components | Credential User Interface: Do not display the password reveal button | Passed | Registry key created | | Passed | |
1722 | Administrative Templates: Windows Components | Credential User Interface: Do not display the password reveal button | Passed | Registry value created/modified | | Passed | |
1724 | Administrative Templates: Windows Components | Credential User Interface: Enumerate administrator accounts on elevation | Passed | Registry key created | | Passed | |
1724 | Administrative Templates: Windows Components | Credential User Interface: Enumerate administrator accounts on elevation | Passed | Registry value created/modified | | Passed | |
1725 | Administrative Templates: Windows Components | Data Collection and Preview Builds: Allow Diagnostic Data | Passed | Registry value created/modified | | Passed | |
1726 | Administrative Templates: Windows Components | Data Collection and Preview Builds: Allow device name to be sent in Windows diagnostic data | Passed | Registry value created/modified | | Passed | |
1727 | Administrative Templates: Windows Components | Delivery Optimization: Download Mode | Passed | Registry key created | | Passed | |
1727 | Administrative Templates: Windows Components | Delivery Optimization: Download Mode | Passed | Registry value created/modified | | Passed | |
1728 | Administrative Templates: Windows Components | Event Log Service: Application: Specify the maximum log file size (KB) | Passed | Registry key created | | Passed | |
1728 | Administrative Templates: Windows Components | Event Log Service: Application: Specify the maximum log file size (KB) | Passed | Registry value created/modified | | Passed | |
1729 | Administrative Templates: Windows Components | Event Log Service: Security: Specify the maximum log file size (KB) | Passed | Registry key created | | Passed | |
1729 | Administrative Templates: Windows Components | Event Log Service: Security: Specify the maximum log file size (KB) | Passed | Registry value created/modified | | Passed | |
1730 | Administrative Templates: Windows Components | Event Log Service: System: Specify the maximum log file size (KB) | Passed | Registry key created | | Passed | |
1730 | Administrative Templates: Windows Components | Event Log Service: System: Specify the maximum log file size (KB) | Passed | Registry value created/modified | | Passed | |
1774 | Administrative Templates: Windows Components | Event Log Service: Microsoft-Windows-PowerShell/Operational: Specify the maximum log file size (KB) | Passed | Registry value created/modified | | Passed | |
1775 | Administrative Templates: Windows Components | Event Log Service: PowerShellCore/Operational: Specify the maximum log file size (KB) | Passed | Registry key created | | Passed | |
1775 | Administrative Templates: Windows Components | Event Log Service: PowerShellCore/Operational: Specify the maximum log file size (KB) | Passed | Registry value created/modified | | Passed | |
1731 | Administrative Templates: Windows Components | File Explorer: Allow the use of remote paths in file shortcut icons | Passed | Registry value created/modified | | Passed | |
1732 | Administrative Templates: Windows Components | HomeGroup: Prevent the computer from joining a homegroup | Passed | Registry key created | | Passed | |
1732 | Administrative Templates: Windows Components | HomeGroup: Prevent the computer from joining a homegroup | Passed | Registry value created/modified | | Passed | |
1800 | Microsoft Defender Antivirus | Turn off Microsoft Defender Antivirus | Passed | Registry value created/modified | | Passed | |
1801 | Microsoft Defender Antivirus | Configure detection for potentially unwanted applications | Passed | Registry value created/modified | | Passed | |
1806 | Microsoft Defender Antivirus | Exclusions: Extension Exclusions (Policy) | Passed | Registry key created | | Passed | |
1806 | Microsoft Defender Antivirus | Exclusions: Extension Exclusions (Policy) | Passed | Registry value created/modified | | Passed | |
1813 | Microsoft Defender Antivirus | Exclusions: Extension Exclusions (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1808 | Microsoft Defender Antivirus | Exclusions: Path Exclusions (Policy) | Passed | Registry value created/modified | | Passed | |
1814 | Microsoft Defender Antivirus | Exclusions: Path Exclusions (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1810 | Microsoft Defender Antivirus | Exclusions: Process Exclusions (Policy) | Passed | Registry value created/modified | | Passed | |
1815 | Microsoft Defender Antivirus | Exclusions: Process Exclusions (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1816 | Microsoft Defender Antivirus | MAPS: Join Microsoft MAPS | Passed | Registry key created | | Passed | |
1816 | Microsoft Defender Antivirus | MAPS: Join Microsoft MAPS | Passed | Registry value created/modified | | Passed | |
1817 | Microsoft Defender Antivirus | MAPS: Configure the 'Block at First Sight' feature | Passed | Registry value created/modified | | Passed | |
1818 | Microsoft Defender Antivirus | MAPS: Send file samples when further analysis is required | Passed | Registry value created/modified | | Passed | |
1819 | Microsoft Defender Antivirus | MpEngine: Enable file hash computation feature | Passed | Registry key created | | Passed | |
1819 | Microsoft Defender Antivirus | MpEngine: Enable file hash computation feature | Passed | Registry value created/modified | | Passed | |
1820 | Microsoft Defender Antivirus | MpEngine: Select cloud protection level | Passed | Registry value created/modified | | Passed | |
1821 | Microsoft Defender Antivirus | Real-time Protection: Scan all downloaded files and attachments | Passed | Registry key created | | Passed | |
1821 | Microsoft Defender Antivirus | Real-time Protection: Scan all downloaded files and attachments | Passed | Registry value created/modified | | Passed | |
1822 | Microsoft Defender Antivirus | Real-time Protection: Turn off real-time protection | Passed | Registry value created/modified | | Passed | |
1823 | Microsoft Defender Antivirus | Real-time Protection: Turn on behavior monitoring (Policy) | Passed | Registry value created/modified | | Passed | |
1824 | Microsoft Defender Antivirus | Real-time Protection: Turn on script scanning | Passed | Registry value created/modified | | Passed | |
1825 | Microsoft Defender Antivirus | Scan: Scan removable drives | Passed | Registry key created | | Passed | |
1825 | Microsoft Defender Antivirus | Scan: Scan removable drives | Passed | Registry value created/modified | | Passed | |
1812 | Microsoft Defender Antivirus | Enable sandboxing for Microsoft Defender Antivirus | Passed | Registry value created/modified | | Passed | |
1900 | Microsoft Defender Exploit Guard | Attack Surface Reduction rules | Passed | Registry key created | | Passed | |
1900 | Microsoft Defender Exploit Guard | Attack Surface Reduction rules | Passed | Registry value created/modified | | Passed | |
1901 | Microsoft Defender Exploit Guard | ASR: Block executable content from email client and webmail (Policy) | Passed | Registry key created | | Passed | |
1901 | Microsoft Defender Exploit Guard | ASR: Block executable content from email client and webmail (Policy) | Passed | Registry value created/modified | | Passed | |
1916 | Microsoft Defender Exploit Guard | ASR: Block executable content from email client and webmail | High | Failed to add ASR rule | | Failed | |
1933 | Microsoft Defender Exploit Guard | ASR: Block executable content from email client and webmail (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1902 | Microsoft Defender Exploit Guard | ASR: Block all Office applications from creating child processes (Policy) | Passed | Registry value created/modified | | Passed | |
1917 | Microsoft Defender Exploit Guard | ASR: Block all Office applications from creating child processes | High | Failed to add ASR rule | | Failed | |
1934 | Microsoft Defender Exploit Guard | ASR: Block all Office applications from creating child processes (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1903 | Microsoft Defender Exploit Guard | ASR: Block Office applications from creating executable content (Policy) | Passed | Registry value created/modified | | Passed | |
1918 | Microsoft Defender Exploit Guard | ASR: Block Office applications from creating executable content | High | Failed to add ASR rule | | Failed | |
1935 | Microsoft Defender Exploit Guard | ASR: Block Office applications from creating executable content (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1904 | Microsoft Defender Exploit Guard | ASR: Block Office applications from injecting code into other processes (Policy) | Passed | Registry value created/modified | | Passed | |
1919 | Microsoft Defender Exploit Guard | ASR: Block Office applications from injecting code into other processes | High | Failed to add ASR rule | | Failed | |
1936 | Microsoft Defender Exploit Guard | ASR: Block Office applications from injecting code into other processes (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1905 | Microsoft Defender Exploit Guard | ASR: Block JavaScript or VBScript from launching downloaded executable content (Policy) | Passed | Registry value created/modified | | Passed | |
1920 | Microsoft Defender Exploit Guard | ASR: Block JavaScript or VBScript from launching downloaded executable content | High | Failed to add ASR rule | | Failed | |
1937 | Microsoft Defender Exploit Guard | ASR: Block JavaScript or VBScript from launching downloaded executable content (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1906 | Microsoft Defender Exploit Guard | ASR: Block execution of potentially obfuscated scripts (Policy) | Passed | Registry value created/modified | | Passed | |
1921 | Microsoft Defender Exploit Guard | ASR: Block execution of potentially obfuscated scripts | High | Failed to add ASR rule | | Failed | |
1938 | Microsoft Defender Exploit Guard | ASR: Block execution of potentially obfuscated scripts (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1907 | Microsoft Defender Exploit Guard | ASR: Block Win32 API calls from Office macros (Policy) | Passed | Registry value created/modified | | Passed | |
1922 | Microsoft Defender Exploit Guard | ASR: Block Win32 API calls from Office macros | High | Failed to add ASR rule | | Failed | |
1939 | Microsoft Defender Exploit Guard | ASR: Block Win32 API calls from Office macros (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1908 | Microsoft Defender Exploit Guard | ASR: Block executable files from running unless they meet a prevalence, age, or trusted list criterion (Policy) | Passed | Registry value created/modified | | Passed | |
1923 | Microsoft Defender Exploit Guard | ASR: Block executable files from running unless they meet a prevalence, age, or trusted list criterion | High | Failed to add ASR rule | | Failed | |
1940 | Microsoft Defender Exploit Guard | ASR: Block executable files from running unless they meet a prevalence, age, or trusted list criterion (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1909 | Microsoft Defender Exploit Guard | ASR: Use advanced protection against ransomware (Policy) | Passed | Registry value created/modified | | Passed | |
1924 | Microsoft Defender Exploit Guard | ASR: Use advanced protection against ransomware | High | Failed to add ASR rule | | Failed | |
1941 | Microsoft Defender Exploit Guard | ASR: Use advanced protection against ransomware (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1910 | Microsoft Defender Exploit Guard | ASR: Block credential stealing from the Windows local security authority subsystem (lsass.exe) (Policy) | Passed | Registry value created/modified | | Passed | |
1925 | Microsoft Defender Exploit Guard | ASR: Block credential stealing from the Windows local security authority subsystem (lsass.exe) | High | Failed to add ASR rule | | Failed | |
1942 | Microsoft Defender Exploit Guard | ASR: Block credential stealing from the Windows local security authority subsystem (lsass.exe) (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1911 | Microsoft Defender Exploit Guard | ASR: Block process creations originating from PSExec and WMI commands (Policy) | Passed | Registry value created/modified | | Passed | |
1926 | Microsoft Defender Exploit Guard | ASR: Block process creations originating from PSExec and WMI commands | High | Failed to add ASR rule | | Failed | |
1943 | Microsoft Defender Exploit Guard | ASR: Block process creations originating from PSExec and WMI commands (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1912 | Microsoft Defender Exploit Guard | ASR: Block untrusted and unsigned processes that run from USB (Policy) | Passed | Registry value created/modified | | Passed | |
1927 | Microsoft Defender Exploit Guard | ASR: Block untrusted and unsigned processes that run from USB | High | Failed to add ASR rule | | Failed | |
1944 | Microsoft Defender Exploit Guard | ASR: Block untrusted and unsigned processes that run from USB (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1913 | Microsoft Defender Exploit Guard | ASR: Block Office communication application from creating child processes (Policy) | Passed | Registry value created/modified | | Passed | |
1928 | Microsoft Defender Exploit Guard | ASR: Block Office communication application from creating child processes | High | Failed to add ASR rule | | Failed | |
1945 | Microsoft Defender Exploit Guard | ASR: Block Office communication application from creating child processes (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1914 | Microsoft Defender Exploit Guard | ASR: Block Adobe Reader from creating child processes (Policy) | Passed | Registry value created/modified | | Passed | |
1929 | Microsoft Defender Exploit Guard | ASR: Block Adobe Reader from creating child processes | High | Failed to add ASR rule | | Failed | |
1946 | Microsoft Defender Exploit Guard | ASR: Block Adobe Reader from creating child processes (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1915 | Microsoft Defender Exploit Guard | ASR: Block persistence through WMI event subscription (Policy) | Passed | Registry value created/modified | | Passed | |
1930 | Microsoft Defender Exploit Guard | ASR: Block persistence through WMI event subscription | High | Failed to add ASR rule | | Failed | |
1947 | Microsoft Defender Exploit Guard | ASR: Block persistence through WMI event subscription (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1931 | Microsoft Defender Exploit Guard | ASR: Block abuse of exploited vulnerable signed drivers (Policy) | Passed | Registry value created/modified | | Passed | |
1932 | Microsoft Defender Exploit Guard | ASR: Block abuse of exploited vulnerable signed drivers | High | Failed to add ASR rule | | Failed | |
1948 | Microsoft Defender Exploit Guard | ASR: Block abuse of exploited vulnerable signed drivers (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1966 | Microsoft Defender Exploit Guard | ASR: Exclude files and paths from Attack Surface Reduction Rules (Policy) | Passed | Registry value created/modified | | Passed | |
1968 | Microsoft Defender Exploit Guard | ASR: Exclude files and paths from Attack Surface Reduction Rules (Intune) | Passed | This setting is not configured by HardeningKitty | | Passed | |
1965 | Microsoft Defender Exploit Guard | Network Protection: Prevent users and apps from accessing dangerous websites | Passed | Registry key created | | Passed | |
1965 | Microsoft Defender Exploit Guard | Network Protection: Prevent users and apps from accessing dangerous websites | Passed | Registry value created/modified | | Passed | |
1767 | Administrative Templates: Windows Components | News and interests: Enable news and interests on the taskbar | Passed | Registry key created | | Passed | |
1767 | Administrative Templates: Windows Components | News and interests: Enable news and interests on the taskbar | Passed | Registry value created/modified | | Passed | |
1733 | Administrative Templates: Windows Components | OneDrive: Prevent the usage of OneDrive for file storage | Passed | Registry key created | | Passed | |
1733 | Administrative Templates: Windows Components | OneDrive: Prevent the usage of OneDrive for file storage | Passed | Registry value created/modified | | Passed | |
1734 | Administrative Templates: Windows Components | Remote Desktop Connection Client: Do not allow passwords to be saved | Passed | Registry value created/modified | | Passed | |
1735 | Administrative Templates: Windows Components | Remote Desktop Session Host: Allow users to connect remotely by using Remote Desktop Services | Passed | Registry value created/modified | | Passed | |
1736 | Administrative Templates: Windows Components | Remote Desktop Session Host: Device and Resource Redirection: Do not allow drive redirection | Passed | Registry value created/modified | | Passed | |
1737 | Administrative Templates: Windows Components | Remote Desktop Session Host: Security: Always prompt for password upon connection | Passed | Registry value created/modified | | Passed | |
1738 | Administrative Templates: Windows Components | Remote Desktop Session Host: Security: Require secure RPC communication | Passed | Registry value created/modified | | Passed | |
1739 | Administrative Templates: Windows Components | Remote Desktop Session Host: Security: Set client connection encryption level | Passed | Registry value created/modified | | Passed | |
1740 | Administrative Templates: Windows Components | Search: Allow Cloud Search | Passed | Registry value created/modified | | Passed | |
1741 | Administrative Templates: Windows Components | Search: Allow Cortana | Passed | Registry value created/modified | | Passed | |
1742 | Administrative Templates: Windows Components | Search: Allow Cortana above lock screen | Passed | Registry value created/modified | | Passed | |
1743 | Administrative Templates: Windows Components | Search: Allow indexing of encrypted files | Passed | Registry value created/modified | | Passed | |
1744 | Administrative Templates: Windows Components | Search: Allow search and Cortana to use location | Passed | Registry value created/modified | | Passed | |
1745 | Administrative Templates: Windows Components | Search: Set what information is shared in Search | Passed | Registry value created/modified | | Passed | |
1746 | Administrative Templates: Windows Components | Windows Error Reporting: Disable Windows Error Reporting | Passed | Registry value created/modified | | Passed | |
1747 | Administrative Templates: Windows Components | Windows Game Recording and Broadcasting: Enables or disables Windows Game Recording and Broadcasting | Passed | Registry key created | | Passed | |
1747 | Administrative Templates: Windows Components | Windows Game Recording and Broadcasting: Enables or disables Windows Game Recording and Broadcasting | Passed | Registry value created/modified | | Passed | |
1748 | Administrative Templates: Windows Components | Windows Ink Workspace: Allow Windows Ink Workspace | Passed | Registry value created/modified | | Passed | |
1749 | Administrative Templates: Windows Components | Windows Installer: Always install with elevated privileges | Passed | Registry key created | | Passed | |
1749 | Administrative Templates: Windows Components | Windows Installer: Always install with elevated privileges | Passed | Registry value created/modified | | Passed | |
1750 | Administrative Templates: Windows Components | Windows Installer: Allow user control over installs | Passed | Registry value created/modified | | Passed | |
1751 | Administrative Templates: Windows Components | Windows Installer: Prevent Internet Explorer security prompt for Windows Installer scripts | Passed | Registry value created/modified | | Passed | |
1752 | Administrative Templates: Windows Components | Windows Logon Options: Sign-in and lock last interactive user automatically after a restart | Passed | Registry value created/modified | | Passed | |
1770 | Administrative Templates: Windows Components | Windows Installer: Disable Co-Installer (USB AutoInstall) | Passed | Registry value created/modified | | Passed | |
1753 | Administrative Templates: Windows Components | WinRM Client: Allow Basic authentication | Passed | Registry key created | | Passed | |
1753 | Administrative Templates: Windows Components | WinRM Client: Allow Basic authentication | Passed | Registry value created/modified | | Passed | |
1754 | Administrative Templates: Windows Components | WinRM Client: Allow unencrypted traffic | Passed | Registry value created/modified | | Passed | |
1755 | Administrative Templates: Windows Components | WinRM Client: Disallow Digest authentication | Passed | Registry value created/modified | | Passed | |
1756 | Administrative Templates: Windows Components | WinRM Service: Allow remote server management through WinRM | Passed | Registry key created | | Passed | |
1756 | Administrative Templates: Windows Components | WinRM Service: Allow remote server management through WinRM | Passed | Registry value created/modified | | Passed | |
1757 | Administrative Templates: Windows Components | WinRM Service: Allow Basic authentication | Passed | Registry value created/modified | | Passed | |
1758 | Administrative Templates: Windows Components | WinRM Service: Allow unencrypted traffic | Passed | Registry value created/modified | | Passed | |
1759 | Administrative Templates: Windows Components | WinRM Service: Disallow WinRM from storing RunAs credentials | Passed | Registry value created/modified | | Passed | |
1760 | Administrative Templates: Windows Components | Windows Remote Shell: Allow Remote Shell Access | Passed | Registry key created | | Passed | |
1760 | Administrative Templates: Windows Components | Windows Remote Shell: Allow Remote Shell Access | Passed | Registry value created/modified | | Passed | |
2000 | Administrative Templates: Windows Components | File Explorer: Configure Windows Defender SmartScreen | Passed | Registry value created/modified | | Passed | |
2001 | Administrative Templates: Windows Components | File Explorer: Configure Windows Defender SmartScreen to warn and prevent bypass | Passed | Registry value created/modified | | Passed | |
2105 | PowerShell | Turn on PowerShell Module Logging | Passed | Registry key created | | Passed | |
2105 | PowerShell | Turn on PowerShell Module Logging | Passed | Registry value created/modified | | Passed | |
2106 | PowerShell | Turn on PowerShell Module Logging - Module Names | Passed | Registry key created | | Passed | |
2106 | PowerShell | Turn on PowerShell Module Logging - Module Names | Passed | Registry value created/modified | | Passed | |
2100 | PowerShell | Turn on PowerShell Script Block Logging | Passed | Registry key created | | Passed | |
2100 | PowerShell | Turn on PowerShell Script Block Logging | Passed | Registry value created/modified | | Passed | |
2101 | PowerShell | Turn on PowerShell Script Block Logging (Invocation) | Passed | Registry value created/modified | | Passed | |
2102 | PowerShell | Turn on PowerShell Transcription | Passed | Registry key created | | Passed | |
2102 | PowerShell | Turn on PowerShell Transcription | Passed | Registry value created/modified | | Passed | |
2107 | PowerShell | Turn on PowerShell Transcription (Invocation) | Passed | Registry value created/modified | | Passed | |
2103 | PowerShell | Disable PowerShell version 2 | Passed | Feature removed | | Passed | |
2104 | PowerShell | Disable PowerShell version 2 (root) | Passed | Feature removed | | Passed | |
2200 | MS Security Guide | LSA Protection | Passed | Registry value created/modified | | Passed | |
2201 | MS Security Guide | Lsass.exe audit mode | Passed | Registry key created | | Passed | |
2201 | MS Security Guide | Lsass.exe audit mode | Passed | Registry value created/modified | | Passed | |
2202 | MS Security Guide | NetBT NodeType configuration | Passed | Registry value created/modified | | Passed | |
2203 | MS Security Guide | WDigest Authentication | Passed | Registry value created/modified | | Passed | |
2209 | MS Security Guide | Enable Structured Exception Handling Overwrite Protection (SEHOP) | Passed | Registry value created/modified | | Passed | |
2210 | MS Security Guide | Limits print driver installation to Administrators | Passed | Registry value created/modified | | Passed | |
2211 | MS Security Guide | Configure RPC packet level privacy setting for incoming connections | Passed | Registry value created/modified | | Passed | |
2212 | MS Security Guide | Manage processing of Queue-specific files | Passed | Registry value created/modified | | Passed | |
2204 | MSS (Legacy) | MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) | Passed | Registry value created/modified | | Passed | |
2205 | MSS (Legacy) | MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) | Passed | Registry value created/modified | | Passed | |
2206 | MSS (Legacy) | MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) | Passed | Registry value created/modified | | Passed | |
2207 | MSS (Legacy) | MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes | Passed | Registry value created/modified | | Passed | |
2208 | MSS (Legacy) | MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers | Passed | Registry value created/modified | | Passed | |
2400 | Scheduled Task | XblGameSave Standby Task | Passed | Scheduled Task was disabled | | Passed | |
2411 | System Services | Disable mDNS in Dnscache service | Passed | Registry value created/modified | | Passed | |
2401 | System Services | Print Spooler (Spooler) | Passed | Registry value created/modified | | Passed | |
2412 | System Services | WebClient (WebClient) | Passed | Registry value created/modified | | Passed | |
2403 | System Services | Xbox Accessory Management Service (XboxGipSvc) | Passed | Registry value created/modified | | Passed | |
2405 | System Services | Xbox Live Auth Manager (XblAuthManager) | Passed | Registry value created/modified | | Passed | |
2407 | System Services | Xbox Live Game Save (XblGameSave) | Passed | Registry value created/modified | | Passed | |
2409 | System Services | Xbox Live Networking Service (XboxNetApiSvc) | Passed | Registry value created/modified | | Passed | |
1950 | Microsoft Defender Exploit Guard | Exploit protection: Control flow guard (CFG) | Passed | setting added to list | | Passed | |
1951 | Microsoft Defender Exploit Guard | Exploit protection: Data Execution Prevention (DEP) | Passed | setting added to list | | Passed | |
1952 | Microsoft Defender Exploit Guard | Exploit protection: Override Data Execution Prevention (DEP) | Passed | setting added to list | | Passed | |
1954 | Microsoft Defender Exploit Guard | Exploit protection: Force randomization for images (Mandatory ASLR) | Passed | setting added to list | | Passed | |
1955 | Microsoft Defender Exploit Guard | Exploit protection: Override force randomization for images (Mandatory ASLR) | Passed | setting added to list | | Passed | |
1956 | Microsoft Defender Exploit Guard | Exploit protection: Randomize memory allocations (Bottom-up ASLR) | Passed | setting added to list | | Passed | |
1957 | Microsoft Defender Exploit Guard | Exploit protection: Override randomize memory allocations (Bottom-up ASLR) | Passed | setting added to list | | Passed | |
1958 | Microsoft Defender Exploit Guard | Exploit protection: High-entropy ASLR | Passed | setting added to list | | Passed | |
1959 | Microsoft Defender Exploit Guard | Exploit protection: Override high-entropy ASLR | Passed | setting added to list | | Passed | |
1960 | Microsoft Defender Exploit Guard | Exploit protection: Validate exception chains (SEHOP) | Passed | setting added to list | | Passed | |
1961 | Microsoft Defender Exploit Guard | Exploit protection: Validate exception chains (SEHOP (Telemetry only) | Passed | setting added to list | | Passed | |
1962 | Microsoft Defender Exploit Guard | Exploit protection: Override validate exception chains (SEHOP) | Passed | setting added to list | | Passed | |
1963 | Microsoft Defender Exploit Guard | Exploit protection: Validate heap integrity | Passed | setting added to list | | Passed | |
1964 | Microsoft Defender Exploit Guard | Exploit protection: Override validate heap integrity | Passed | setting added to list | | Passed | |
1953 | Microsoft Defender Exploit Guard | Force use of Data Execution Prevention (DEP) | Passed | Setting enabled. Please restart the system to activate it | | Passed | |
2300 | Windows Firewall | HardeningKitty-Block-TCP-NetBIOS | Passed | Rule created | | Passed | |
2301 | Windows Firewall | HardeningKitty-Block-TCP-RDP | Passed | Rule created | | Passed | |
2302 | Windows Firewall | HardeningKitty-Block-TCP-RPC | Passed | Rule created | | Passed | |
2303 | Windows Firewall | HardeningKitty-Block-TCP-SMB | Passed | Rule created | | Passed | |
2304 | Windows Firewall | HardeningKitty-Block-TCP-WinRM | Passed | Rule created | | Passed | |
2305 | Windows Firewall | HardeningKitty-Block-UDP-NetBIOS | Passed | Rule created | | Passed | |
2306 | Windows Firewall | HardeningKitty-Block-UDP-RPC | Passed | Rule created | | Passed | |
2307 | Windows Firewall | HardeningKitty-Block-calc-x64 | Passed | Rule created | | Passed | |
2308 | Windows Firewall | HardeningKitty-Block-calc-x86 | Passed | Rule created | | Passed | |
2309 | Windows Firewall | HardeningKitty-Block-certutil-x64 | Passed | Rule created | | Passed | |
2310 | Windows Firewall | HardeningKitty-Block-certutil-x86 | Passed | Rule created | | Passed | |
2311 | Windows Firewall | HardeningKitty-Block-conhost-x64 | Passed | Rule created | | Passed | |
2312 | Windows Firewall | HardeningKitty-Block-conhost-x86 | Passed | Rule created | | Passed | |
2313 | Windows Firewall | HardeningKitty-Block-cscript-x64 | Passed | Rule created | | Passed | |
2314 | Windows Firewall | HardeningKitty-Block-cscript-x86 | Passed | Rule created | | Passed | |
2315 | Windows Firewall | HardeningKitty-Block-mshta-x64 | Passed | Rule created | | Passed | |
2316 | Windows Firewall | HardeningKitty-Block-mshta-x86 | Passed | Rule created | | Passed | |
2317 | Windows Firewall | HardeningKitty-Block-notepad-x64 | Passed | Rule created | | Passed | |
2318 | Windows Firewall | HardeningKitty-Block-notepad-x86 | Passed | Rule created | | Passed | |
2319 | Windows Firewall | HardeningKitty-Block-RunScriptHelper-x64 | Passed | Rule created | | Passed | |
2320 | Windows Firewall | HardeningKitty-Block-RunScriptHelper-x86 | Passed | Rule created | | Passed | |
2321 | Windows Firewall | HardeningKitty-Block-wscript-x64 | Passed | Rule created | | Passed | |
2322 | Windows Firewall | HardeningKitty-Block-wscript-x86 | Passed | Rule created | | Passed | |
2322 | Windows Firewall | HardeningKitty-Block-wscript-x86 | Passed | Process mitigation settings set | | Passed | |