All Object Templates in Microsoft.ControlActivity.WS08SP2.Library Management Pack

 DisplayNameDescriptionIDType
ID_0296aa7b_27f6_4e0c_b7bf_40e2015df7edLogging ConfigurationUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure the Event Log service to ensure availability and transactional integrity to ensure that all transactions are able to log any errors.ID_0296aa7b_27f6_4e0c_b7bf_40e2015df7edMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_0649d83c_cb51_4c48_9381_d0b0634fd437Logging ConfigurationUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure the Event Log service to ensure availability and transactional integrity to ensure that all transactions are able to log any errors.ID_0649d83c_cb51_4c48_9381_d0b0634fd437Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_081c1360_4c15_4499_916d_ac38090b9f99Configure Authorized ProtocolsThis control activity guides the IT professional through configuration of the local operating system protocol settings.ID_081c1360_4c15_4499_916d_ac38090b9f99System.Compliance.ManualControlActivityProjection
ID_139ef24d_c049_44df_b603_844e263af265Proceduralize Event Consolidation, Correlation, and Recreation through LogsConsolidate, correlate, and recreate events using the Windows Event Log.ID_139ef24d_c049_44df_b603_844e263af265System.Compliance.ManualControlActivityProjection
ID_169133b3_e2d8_4a23_b306_490e71bd7051Configure Local Firewall ParametersThis control activity guides the IT professional through configuration of the local operating system firewall.ID_169133b3_e2d8_4a23_b306_490e71bd7051System.Compliance.ManualControlActivityProjection
ID_17b61d57_d402_4b85_b65e_383771644aa8Proceduralize the Configuration of System Security ParametersMaintain a procedure by which operating system kernel security, system virtual memory clearing, and stack protection is managed.ID_17b61d57_d402_4b85_b65e_383771644aa8System.Compliance.ManualControlActivityProjection
ID_182bb2e6_c65b_419d_a675_a4fb92ad4391Authentication TypesUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure two-factor authentication to prevent unauthorized access if an account ID and password is compromised.ID_182bb2e6_c65b_419d_a675_a4fb92ad4391Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_1b5d8015_f205_4b7a_8635_e4778a8566a4Network ProtectionUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure anti-spoofing network settings within the operating system.ID_1b5d8015_f205_4b7a_8635_e4778a8566a4Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_20ef3655_6a1e_4077_bed2_5841203a7b4dLog Access LimitationUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure roles and rights management so that only authorized accounts may access operating system logs to prevent information disclosure or changing the log contents.ID_20ef3655_6a1e_4077_bed2_5841203a7b4dMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_22172b76_fdc3_48c9_b8e7_ca7b211b595aKey ManagementUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure encryption key use and storage in the operating system to prevent unauthorized access.ID_22172b76_fdc3_48c9_b8e7_ca7b211b595aMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_238ec1b1_3ff2_484f_b10c_27624d2ec821Least PrivilegeUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure roles and rights management to reduce available actions to only those authorized by the organization.ID_238ec1b1_3ff2_484f_b10c_27624d2ec821Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_2670e242_2e94_484f_9955_c7c1d31aaffbAuthentication TypesUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure two-factor authentication to prevent unauthorized access if an account ID and password is compromised.ID_2670e242_2e94_484f_9955_c7c1d31aaffbMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_28dd86b2_7ec7_427d_8007_bb64171b96f6System DefaultsUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure member server default accounts and authentication values to nondefault accounts and values to prevent unauthorized access with commonly known credentials.ID_28dd86b2_7ec7_427d_8007_bb64171b96f6Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_2a0b6252_8da1_4c85_b155_a2694ea3cb9cSession ConfigurationUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure session parameters to ensure disconnection and resumption occur in a controlled manner to reduce the chances of a compromised session.ID_2a0b6252_8da1_4c85_b155_a2694ea3cb9cMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_311b60de_6b80_4030_aa48_2df2205cfd79Encryption ConfigurationUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure algorithms and their use in the operating system to protect data at rest and in transit.ID_311b60de_6b80_4030_aa48_2df2205cfd79Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_327bf33a_d253_4582_9f90_5eba0ce09d92Proceduralize Remote Access Connectivity ManagementMaintain a procedure to facilitate authorized remote access connectivity and to prevent unapproved remote access methods.ID_327bf33a_d253_4582_9f90_5eba0ce09d92System.Compliance.ManualControlActivityProjection
ID_33c15c17_0197_41fe_8a22_48ccdf821965Proceduralize Log Service Availability ManagementMaintain a procedure by which log service failure is detected and remediated within a specified timeframe or in accordance with a service level agreement.ID_33c15c17_0197_41fe_8a22_48ccdf821965System.Compliance.ManualControlActivityProjection
ID_35673a88_189b_4a8f_9ebf_e6848627f475Event LoggingUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure the Event Log service to ensure that events relevant to compliance are recorded so that they may be used to investigate compliance violations.ID_35673a88_189b_4a8f_9ebf_e6848627f475Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_365ccb5d_b1fd_4ddb_a5dd_118e059fd6cfSystem ServicesUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure the Domain Controller role through system services to ensure that only authorized services are enabled.ID_365ccb5d_b1fd_4ddb_a5dd_118e059fd6cfMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_378beaba_b018_4c17_853e_77d4a32c591aLeast PrivilegeUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure roles and rights management to reduce available actions to only those authorized by the organization.ID_378beaba_b018_4c17_853e_77d4a32c591aMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_391a783c_d7e8_4d67_9342_be5bd0882eecProceduralize the Restriction of Access to LogsMaintain a procedure to ensure that access to system logs is restricted to authorized personnel.ID_391a783c_d7e8_4d67_9342_be5bd0882eecSystem.Compliance.ManualControlActivityProjection
ID_3f2f7bbb_2af2_499b_892f_3aa68f6c4bf7Log Access LimitationUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure roles and rights management so that only authorized accounts may access operating system logs to prevent information disclosure or changing the log contents.ID_3f2f7bbb_2af2_499b_892f_3aa68f6c4bf7Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_40ec5d64_ed3e_4acb_8696_be25a9188c0fProtocol ConfigurationUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure the local operating system protocol settings to ensure only authorized protocols are used and that their attack profiles are minimized.ID_40ec5d64_ed3e_4acb_8696_be25a9188c0fMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_44dc6b1e_20df_4f00_977b_aa61af94abdbProtocol ConfigurationUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure the local operating system protocol settings to ensure only authorized protocols are used and that their attack profiles are minimized.ID_44dc6b1e_20df_4f00_977b_aa61af94abdbMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_460dfe54_f0fb_43f1_90d0_789d94b70d7bProceduralize the Preservation of Original Log FilesMaintain a logging function of assets that creates reference copies of log files to support investigations without affecting original log files.ID_460dfe54_f0fb_43f1_90d0_789d94b70d7bSystem.Compliance.ManualControlActivityProjection
ID_489f0301_29cf_4e25_8bb6_c3ffa4410271System ServicesUse the WS2008SP2 Network Access Services Server Security Compliance 1.0 baseline to configure the Network Access Services Server role through system services to ensure that only authorized services are enabled.ID_489f0301_29cf_4e25_8bb6_c3ffa4410271Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_4afd53d0_5c3e_460c_915f_349bbe6ea54fSystem ServicesUse the WS2008SP2 File Server Security Compliance 1.0 baseline to configure the File Server role through system services to ensure that only authorized services are enabled.ID_4afd53d0_5c3e_460c_915f_349bbe6ea54fMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_5151d52d_25d7_4e15_a500_c9c3451fcca4Log Meaningful EventsThis control activity guides the IT professional through configuration of the Event Log service to ensure that events that are relevant to compliance are recorded. Such events include the creation/modification/deletion of files, directories, and user accounts.ID_5151d52d_25d7_4e15_a500_c9c3451fcca4System.Compliance.ManualControlActivityProjection
ID_5b63d67f_2cc5_42a0_a2aa_399ce9db3fefSystem DefaultsUse the WS2008SP2 Domain Control Security Compliance 1.0 baseline to configure domain server default accounts and authentication values to nondefault accounts and values to prevent unauthorized access with commonly known credentials.ID_5b63d67f_2cc5_42a0_a2aa_399ce9db3fefMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_5bc3c9aa_ff2c_46e3_bf4c_bc28e04d822dSystem ServicesUse the WS2008SP2 DHCP Server Security Compliance 1.0 baseline to configure the DHCP role through system services to ensure that only authorized services are enabled.ID_5bc3c9aa_ff2c_46e3_bf4c_bc28e04d822dMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_78251008_c241_4176_af41_edde194a3eccSystem ServicesUse the WS2008SP2 Hyper-V Security Compliance 1.0 to configure the Hyper-V role through system services to ensure that only authorized services are enabled.ID_78251008_c241_4176_af41_edde194a3eccMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_786a34c1_6e6f_4fed_9eb7_f6b242fac17bProceduralize the Monitoring of Access to Sensitive DataMaintain a procedure to monitor access to sensitive data as defined by the organization's data classification or equivalent policy.ID_786a34c1_6e6f_4fed_9eb7_f6b242fac17bSystem.Compliance.ManualControlActivityProjection
ID_7dc0db17_1364_4fbe_bb41_189891ea1794System IntegrityUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure settings that log conditions affecting the integrity of a system, such as whether it is infected, improperly configured, or unable to log events.ID_7dc0db17_1364_4fbe_bb41_189891ea1794Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_800d5d93_1a32_42a7_9282_d5a55e5dc92cEvent LoggingUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure the Event Log service to ensure that events relevant to compliance are recorded so that they may be used to investigate compliance violations.ID_800d5d93_1a32_42a7_9282_d5a55e5dc92cMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_86657a03_8eb4_4c54_b200_0f13703f005dName ResolutionMaintain a procedure by which domain name service is configured to an authorized source, limited to authorized zone transfer recipients, and configured for redundancy.ID_86657a03_8eb4_4c54_b200_0f13703f005dSystem.Compliance.ManualControlActivityProjection
ID_8d7e3bf6_21cc_407c_8c0d_9a7ad7d9857aProceduralize Capacity and Availability MonitoringMonitor assets for capacity and availability thresholds, alert when thresholds are exceeded, and respond to alerts as required by your organization’s incident management process.ID_8d7e3bf6_21cc_407c_8c0d_9a7ad7d9857aSystem.Compliance.ManualControlActivityProjection
ID_9a5dad88_177b_414f_b374_431668c37919Session ConfigurationUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure session parameters to ensure disconnection and resumption occur in a controlled manner to reduce the chances of a compromised session.ID_9a5dad88_177b_414f_b374_431668c37919Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_9bff7730_8887_40fa_8f55_7ac7acec22a8Identity ManagementUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure accounts to prevent the use of duplicate identities, and allow the organization to determine which individual is associated with a specific action performed by an account.ID_9bff7730_8887_40fa_8f55_7ac7acec22a8Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_9df6e59f_37b6_4177_b7a3_647f3e0edac2System ServicesUse the WS2008SP2 Terminal Services Security Compliance 1.0 baseline to configure the File Server role through system services to ensure that only authorized services are enabled.ID_9df6e59f_37b6_4177_b7a3_647f3e0edac2Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_a5f005fa_787c_4d9c_979a_fe7c1faaf489Proceduralize the Data Classification ProcessMaintain a procedure by which sensitive or personal data is classified, and labelled.ID_a5f005fa_787c_4d9c_979a_fe7c1faaf489System.Compliance.ManualControlActivityProjection
ID_a7903c12_ccbf_4e99_8719_55a6d69ee376System ServicesUse the WS2008SP2 AD Certificate Services Security Compliance 1.0 baseline to configure the Active Directory Certificate Services (AD CS) role through system services to ensure that only authorized services are enabled.ID_a7903c12_ccbf_4e99_8719_55a6d69ee376Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_a819bfec_7f1e_4097_8762_963765509287Proceduralize Vendor Access ManagementMaintain a procedure to allow asset administrators to grant access to vendors for a required specified duration to conduct legitimate work by creating or enabling vendor accounts that are associated with the individuals performing the work.ID_a819bfec_7f1e_4097_8762_963765509287System.Compliance.ManualControlActivityProjection
ID_afb9143d_06e0_44a8_887f_026af1b37faaLeast FunctionalityUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure operating system features and functionality to only those necessary and authorized by the organization, in order to narrow the operating system's attack surface.ID_afb9143d_06e0_44a8_887f_026af1b37faaMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_b0c61d31_19cd_41cd_8376_c032c2bd48a7Configure SNMP ParametersThis control activity guides the IT professional through a process to reconfigure default SNMP values to custom values.ID_b0c61d31_19cd_41cd_8376_c032c2bd48a7System.Compliance.ManualControlActivityProjection
ID_b16691fb_30ec_4099_9b2d_364c655cdb10Password AttributesUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure account password parameters to address password format, visibility, and lifespan to reduce the chance of brute-force or shoulder-surfing compromises.ID_b16691fb_30ec_4099_9b2d_364c655cdb10Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_b4c87e61_288b_497d_94f1_4ea0e9c04d38Proceduralize Access Lock ManagementMaintain a procedure that allows asset administrators to remove access locks that are triggered by access attempt failures.ID_b4c87e61_288b_497d_94f1_4ea0e9c04d38System.Compliance.ManualControlActivityProjection
ID_b9cce6ff_e3df_4034_9f3a_85839eb113e0Password AttributesUse the WS2008SP2 Domain Controller Security Compliance 1.0 baseline to configure account password parameters to address password format, visibility, and lifespan to reduce the chance of brute-force or shoulder-surfing compromises.ID_b9cce6ff_e3df_4034_9f3a_85839eb113e0Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_bb897b3c_9308_47c4_aec8_a2f7a3929b09System IntegrityUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure settings that log conditions affecting the integrity of a system, such as whether it is infected, improperly configured, or unable to log events.ID_bb897b3c_9308_47c4_aec8_a2f7a3929b09Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_bcbe096b_8b19_4e5b_9866_0ef75ec072adSystem ServicesUse the WS2008SP2 Print Server Security Compliance 1.0 baseline to configure the Print Server role through system services to ensure that only authorized services are enabled.ID_bcbe096b_8b19_4e5b_9866_0ef75ec072adMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_bf4871e4_d7e7_4b6a_836c_254ea9f386d9Least FunctionalityUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure operating system features and functionality to only those necessary and authorized by the organization, in order to narrow the operating system's attack surface.ID_bf4871e4_d7e7_4b6a_836c_254ea9f386d9Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_c0edb84e_785e_4820_ad89_c68d50eeba99Account LockUse the WS2008SP2 Domain Security Compliance 1.0 baseline to configure user authentication to lock accounts after unsuccessful logon attempts in order to reduce the chance of brute-force attacks.ID_c0edb84e_785e_4820_ad89_c68d50eeba99Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_c5adf262_bfae_4f0d_9519_3cde8d968358Key ManagementUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure encryption key use and storage in the operating system to prevent unauthorized access.ID_c5adf262_bfae_4f0d_9519_3cde8d968358Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_c5e879c9_262e_496e_8ff4_f17772b8b0bbProceduralize the Data Retention ProcessMaintain a procedure by which logs are retained for the period prescribed by your organization, default system documentation is removed, and demonstration applications are removed. Log Retention Configuration Default Documentation Removal Demonstration Application RemovalID_c5e879c9_262e_496e_8ff4_f17772b8b0bbSystem.Compliance.ManualControlActivityProjection
ID_d72ca42f_37c6_4163_aa49_e41db42f9e9bConfigure EncryptionThis control activity guides the IT professional through configuring the use of FIPS-compliant protocols and algorithms within the operating system.ID_d72ca42f_37c6_4163_aa49_e41db42f9e9bSystem.Compliance.ManualControlActivityProjection
ID_e15cd04e_4245_4f93_9a76_e50ed2adbec8Configure Local Time and Clock ParametersThis control activity guides the IT professional through the process of configuring a Windows Server 2008 server as an authoritative time server.ID_e15cd04e_4245_4f93_9a76_e50ed2adbec8System.Compliance.ManualControlActivityProjection
ID_e36a7c14_0053_48c4_83ce_cc88d95596b2Password AttributesUse the WS2008SP2 Domain Security Compliance baseline 1.0 to configure account password parameters to address password format, visibility, and lifespan, to reduce the chance of brute-force or shoulder-surfing compromises.ID_e36a7c14_0053_48c4_83ce_cc88d95596b2Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_e9f8337e_27b9_4224_be66_6c77a72229f4Configure User Notification ParametersThis control activity guides the IT professional through the configuration of local operating system settings that control warning banners.ID_e9f8337e_27b9_4224_be66_6c77a72229f4System.Compliance.ManualControlActivityProjection
ID_ebac0aac_9e39_4607_a2ee_9496f437aabbIdentity ManagementUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure accounts to prevent the use of duplicate identities, allowing the organization to determine which individual is associated with a specific action performed by an account.ID_ebac0aac_9e39_4607_a2ee_9496f437aabbMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_ec7871cf_2af1_48d0_b7cd_fc741c485997Proceduralize Error and Fault LoggingMonitor for qualified errors and faults within deployed assets.ID_ec7871cf_2af1_48d0_b7cd_fc741c485997System.Compliance.ManualControlActivityProjection
ID_ee01620d_dd71_4cdf_8bc5_72ff12264dfeConfigure Network Security ParametersThis control activity guides the IT professional through configuring anti-spoofing network settings within the operating system.ID_ee01620d_dd71_4cdf_8bc5_72ff12264dfeSystem.Compliance.ManualControlActivityProjection
ID_ee195bb4_aaf6_4e3a_9566_f33f93013f68Proceduralize the Authorization of ServicesMaintain a procedure by which services are authorized for enablement.ID_ee195bb4_aaf6_4e3a_9566_f33f93013f68System.Compliance.ManualControlActivityProjection
ID_f086bd4b_3389_4783_a34f_154495c752fdEncryption ConfigurationUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure algorithms and their use in the operating system to protect data at rest and in transit.ID_f086bd4b_3389_4783_a34f_154495c752fdMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_f1fccb33_8b78_4f30_9e3c_09a9fe67f6c6Configure Data Backup FunctionalityThis control activity guides the IT professional through configuration of the local operating system data backup settings.ID_f1fccb33_8b78_4f30_9e3c_09a9fe67f6c6System.Compliance.ManualControlActivityProjection
ID_f5361ca1_6d60_4b57_a350_dfeb8756ba0fNetwork ProtectionUse the WS2008SP2 Member Server Security Compliance 1.0 baseline to configure anti-spoofing network settings within the operating system.ID_f5361ca1_6d60_4b57_a350_dfeb8756ba0fMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_f8260793_1879_4513_b429_1939e9e41d23Configure Authentication TypesThis control activity guides the IT professional through configuration of two-factor authentication.ID_f8260793_1879_4513_b429_1939e9e41d23System.Compliance.ManualControlActivityProjection
ID_faa1c559_53f1_49ac_829b_c694797b98abSystem ServicesUse the WS2008SP2 Web Server Security Compliance 1.0 baseline to configure the Web Server role through system services to ensure that only authorized services are enabled.ID_faa1c559_53f1_49ac_829b_c694797b98abMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_fddd269d_98ea_4170_9b71_cc44621f9518System ServicesUse the WS2008SP2 DNS Server Security Compliance 1.0 baseline to configure the DNS role through system services to ensure that only authorized services are enabled.ID_fddd269d_98ea_4170_9b71_cc44621f9518Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection