All Object Templates in Microsoft.ControlActivity.WS2003SP2.Library Management Pack

 DisplayNameDescriptionIDType
ID_081c1360_4c15_4499_916d_ac38090b9f99Configure Authorized ProtocolsThis control activity guides the IT professional through configuration of the local operating system protocol settings.ID_081c1360_4c15_4499_916d_ac38090b9f99System.Compliance.ManualControlActivityProjection
ID_08766e03_3edd_43ea_a22b_9c718daba0b9Session ConfigurationUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure session parameters to ensure disconnection and resumption occur in a controlled manner to reduce the chances of a compromised session.ID_08766e03_3edd_43ea_a22b_9c718daba0b9Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_11da7fc4_209a_4c9c_8789_a3bdb1d9ae93Password AttributesUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure account password parameters to address password format, visibility, and lifespan to reduce the chance of brute-force or shoulder-surfing compromises.ID_11da7fc4_209a_4c9c_8789_a3bdb1d9ae93Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_139ef24d_c049_44df_b603_844e263af265Proceduralize Event Consolidation, Correlation, and Recreation through LogsConsolidate, correlate, and recreate events using the Windows Event Log.ID_139ef24d_c049_44df_b603_844e263af265System.Compliance.ManualControlActivityProjection
ID_160bf947_e9de_4aac_860a_04c9357aeccbSystem ServicesUse the WS2003SP2 Print Server Security Compliance 1.0 Baseline to configure the Print Server role through system services to ensure that only authorized services are enabled.ID_160bf947_e9de_4aac_860a_04c9357aeccbMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_169133b3_e2d8_4a23_b306_490e71bd7051Configure Local Firewall ParametersThis control activity guides the IT professional through configuration of the local operating system firewall.ID_169133b3_e2d8_4a23_b306_490e71bd7051System.Compliance.ManualControlActivityProjection
ID_17b61d57_d402_4b85_b65e_383771644aa8Proceduralize the Configuration of System Security ParametersMaintain a procedure by which operating system kernel security, system virtual memory clearing, and stack protection is managed.ID_17b61d57_d402_4b85_b65e_383771644aa8System.Compliance.ManualControlActivityProjection
ID_18fcb203_29ea_4a32_8f8e_1878a16392c4Least PrivilegeUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure roles and rights management to reduce available actions to only those authorized by the organization.ID_18fcb203_29ea_4a32_8f8e_1878a16392c4Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_1fe0b3e2_0c90_4d8d_9aa0_131b8416602bAuthentication TypesUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure two-factor authentication to prevent unauthorized access if an account ID and password is compromised.ID_1fe0b3e2_0c90_4d8d_9aa0_131b8416602bMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_20b4c5fe_3800_4b8c_943e_714c42d3f5f6Network ProtectionUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure anti-spoofing network settings in the operating system.ID_20b4c5fe_3800_4b8c_943e_714c42d3f5f6Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_327bf33a_d253_4582_9f90_5eba0ce09d92Proceduralize Remote Access Connectivity ManagementMaintain a procedure to facilitate authorized remote access connectivity and to prevent unapproved remote access methods.ID_327bf33a_d253_4582_9f90_5eba0ce09d92System.Compliance.ManualControlActivityProjection
ID_33c15c17_0197_41fe_8a22_48ccdf821965Proceduralize Log Service Availability ManagementMaintain a procedure by which log service failure is detected and remediated within a specified timeframe or in accordance with a service level agreement.ID_33c15c17_0197_41fe_8a22_48ccdf821965System.Compliance.ManualControlActivityProjection
ID_391a783c_d7e8_4d67_9342_be5bd0882eecProceduralize the Restriction of Access to LogsMaintain a procedure to ensure that access to system logs is restricted to authorized personnel.ID_391a783c_d7e8_4d67_9342_be5bd0882eecSystem.Compliance.ManualControlActivityProjection
ID_418c1de2_6315_4d15_a2fc_678f56d0cdd2Logging ConfigurationUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure the Event Log service to ensure availability and transactional integrity to ensure that all transactions are able to log any errors.ID_418c1de2_6315_4d15_a2fc_678f56d0cdd2Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_439631f3_e7be_4d33_84ce_e79af5a1f88cAccount LockUse the WS2003SP2 Domain Security Compliance 1.0 baseline to configure user authentication to lock accounts after unsuccessful logon attempts in order to reduce the chance of brute-force attacks.ID_439631f3_e7be_4d33_84ce_e79af5a1f88cMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_460dfe54_f0fb_43f1_90d0_789d94b70d7bProceduralize the Preservation of Original Log FilesMaintain a logging function of assets that creates reference copies of log files to support investigations without affecting original log files.ID_460dfe54_f0fb_43f1_90d0_789d94b70d7bSystem.Compliance.ManualControlActivityProjection
ID_5151d52d_25d7_4e15_a500_c9c3451fcca4Log Meaningful EventsThis control activity guides the IT professional through configuration of the Event Log service to ensure that events that are relevant to compliance are recorded. Such events include the creation/modification/deletion of files, directories, and user accounts.ID_5151d52d_25d7_4e15_a500_c9c3451fcca4System.Compliance.ManualControlActivityProjection
ID_5327eb81_4220_4099_a810_aff9c6f6a73aPassword AttributesUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure account password parameters to address password format, visibility, and lifespan to reduce the chance of brute-force or shoulder-surfing compromises.ID_5327eb81_4220_4099_a810_aff9c6f6a73aMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_54fc0928_e5c6_44b4_8caf_283ed955db14Identity ManagementUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure accounts to prevent the use of duplicate identities, in order to allow the organization to determine which individual is associated with a specific action performed by an account.ID_54fc0928_e5c6_44b4_8caf_283ed955db14Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_561a7bcb_1ce2_4ab0_8be2_b4d3c62c7ce1Encryption ConfigurationUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure algorithms and their use within the operating system to protect data at rest and in transit.ID_561a7bcb_1ce2_4ab0_8be2_b4d3c62c7ce1Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_632e0a84_ccc2_4253_ab73_115484bd7590Least PrivilegeUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure operating system features and functionality to only those necessary and authorized by the organization, in order to narrow the operating system's attack surface.ID_632e0a84_ccc2_4253_ab73_115484bd7590Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_63a34764_b592_42b0_9b89_ceda88133a73System ServicesUse the WS2003SP2 Web Server Security Compliance 1.0 baseline to configure the Web Server role through system services to ensure that only authorized services are enabled.ID_63a34764_b592_42b0_9b89_ceda88133a73Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_64394f04_f0cd_4e9e_83b2_0b640703b893System ServicesUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure the Domain Controller role through system services to ensure that only authorized services are enabled.ID_64394f04_f0cd_4e9e_83b2_0b640703b893Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_6d2fe272_c18d_4a76_b1aa_1aa5f2bc7319Least FunctionalityUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure operating system features and functionality to only those necessary and authorized by the organization, in order to narrow the operating system's attack surface.ID_6d2fe272_c18d_4a76_b1aa_1aa5f2bc7319Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_6e28e1dc_4f61_44f5_8c72_7303b2a11d92System IntegrityUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure settings that log conditions affecting the integrity of a system, such as whether it is infected, improperly configured, or unable to log events.ID_6e28e1dc_4f61_44f5_8c72_7303b2a11d92Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_76966322_41ef_4972_b886_a89648f3bcffSystem DefaultsUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure default accounts and authentication values to nondefault accounts and values to prevent unauthorized access with commonly known credentials.ID_76966322_41ef_4972_b886_a89648f3bcffMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_786a34c1_6e6f_4fed_9eb7_f6b242fac17bProceduralize the Monitoring of Access to Sensitive DataMaintain a procedure to monitor access to sensitive data as defined by the organization's data classification or equivalent policy.ID_786a34c1_6e6f_4fed_9eb7_f6b242fac17bSystem.Compliance.ManualControlActivityProjection
ID_7a63e375_f1cc_4088_abfa_bf2f19d06e7eEvent LoggingUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure the Event Log service to ensure that events relevant to compliance are recorded so that they may be used to investigate compliance violations.ID_7a63e375_f1cc_4088_abfa_bf2f19d06e7eMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_81c85293_5698_43e8_8127_5450f47bc91eAuthentication TypesUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure two-factor authentication to prevent unauthorized access if an account ID and password is compromised.ID_81c85293_5698_43e8_8127_5450f47bc91eMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_84fc0841_7926_4ed3_b369_e8920f2689beLog Access LimitationUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure roles and rights management so that only authorized accounts may access operating system logs to prevent information disclosure or changing the log contents.ID_84fc0841_7926_4ed3_b369_e8920f2689beMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_86657a03_8eb4_4c54_b200_0f13703f005dName ResolutionMaintain a procedure by which domain name service is configured to an authorized source, limited to authorized zone transfer recipients, and configured for redundancy.ID_86657a03_8eb4_4c54_b200_0f13703f005dSystem.Compliance.ManualControlActivityProjection
ID_8d7e3bf6_21cc_407c_8c0d_9a7ad7d9857aProceduralize Capacity and Availability MonitoringMonitor assets for capacity and availability thresholds, alert when thresholds are exceeded, and respond to alerts as required by your organization’s incident management process.ID_8d7e3bf6_21cc_407c_8c0d_9a7ad7d9857aSystem.Compliance.ManualControlActivityProjection
ID_96e5006a_7c8c_450b_9f20_a04439bbdb53Network ProtectionUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure anti-spoofing network settings within the operating system.ID_96e5006a_7c8c_450b_9f20_a04439bbdb53Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_988f6f9e_de1b_46a6_a247_193d36336f4fKey ManagementUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure encryption key use and storage in the operating system to prevent unauthorized access.ID_988f6f9e_de1b_46a6_a247_193d36336f4fMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_99981482_7b62_4b41_b854_1c62ae99e2aaSystem ServicesUse the WS2003SP2 DHCP Server Security Compliance 1.0 baseline to configure the DHCP role through system services to ensure that only authorized services are enabled.ID_99981482_7b62_4b41_b854_1c62ae99e2aaMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_9e0deaa0_2a0a_4732_88c1_d6b5664e1e01Password AttributesUse the WS2003SP2 Domain Security Compliance 1.0 baseline to configure account password parameters to address password format, visibility, and lifespan to reduce the chance of brute-force or shoulder-surfing compromises.ID_9e0deaa0_2a0a_4732_88c1_d6b5664e1e01Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_9ef164f3_dd7e_49c9_8c15_eaea9a18be0bLogging ConfigurationUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure the Event Log service to ensure availability and transactional integrity to ensure that all transactions are able to log any errors.ID_9ef164f3_dd7e_49c9_8c15_eaea9a18be0bMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_a4541aff_bb56_4228_bd24_d15b098a570bLeast FunctionalityUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure operating system features and functionality to only those necessary and authorized by the organization, in order to narrow the operating system's attack surface.ID_a4541aff_bb56_4228_bd24_d15b098a570bMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_a5f005fa_787c_4d9c_979a_fe7c1faaf489Proceduralize the Data Classification ProcessMaintain a procedure by which sensitive or personal data is classified, and labelled.ID_a5f005fa_787c_4d9c_979a_fe7c1faaf489System.Compliance.ManualControlActivityProjection
ID_a6cfe7f5_84e4_413a_b52b_7ccee47d98b0System ServicesUse the WS2003SP2 File Server Security Compliance 1.0 to configure the File Server role through system services to ensure that only authorized services are enabled.ID_a6cfe7f5_84e4_413a_b52b_7ccee47d98b0Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_a819bfec_7f1e_4097_8762_963765509287Proceduralize Vendor Access ManagementMaintain a procedure to allow asset administrators to grant access to vendors for a required specified duration to conduct legitimate work by creating or enabling vendor accounts that are associated with the individuals performing the work.ID_a819bfec_7f1e_4097_8762_963765509287System.Compliance.ManualControlActivityProjection
ID_a96f88aa_e385_4996_a44a_bfbd979712c2Key ManagementUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure encryption key use and storage in the operating system to prevent unauthorized access.ID_a96f88aa_e385_4996_a44a_bfbd979712c2Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_a98bb268_9eb6_420d_bc7b_9f733106968aProtocol ConfigurationUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure the local operating system protocol settings to ensure only authorized protocols are used and that their attack profiles are minimized.ID_a98bb268_9eb6_420d_bc7b_9f733106968aMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_b0c61d31_19cd_41cd_8376_c032c2bd48a7Configure SNMP ParametersThis control activity guides the IT professional through a process to reconfigure default SNMP values to custom values.ID_b0c61d31_19cd_41cd_8376_c032c2bd48a7System.Compliance.ManualControlActivityProjection
ID_b1562cb6_107c_473e_8a5a_7a0f721444beEvent LoggingUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure the Event Log service to ensure that events relevant to compliance are recorded so that they may be used to investigate compliance violations.ID_b1562cb6_107c_473e_8a5a_7a0f721444beMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_b4c87e61_288b_497d_94f1_4ea0e9c04d38Proceduralize Access Lock ManagementMaintain a procedure that allows asset administrators to remove access locks that are triggered by access attempt failures.ID_b4c87e61_288b_497d_94f1_4ea0e9c04d38System.Compliance.ManualControlActivityProjection
ID_be9dd17a_cb0a_4588_9d95_d289f87d6a52System DefaultsUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure default accounts and authentication values to nondefault accounts and values to prevent unauthorized access with commonly known credentials.ID_be9dd17a_cb0a_4588_9d95_d289f87d6a52Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_c5e879c9_262e_496e_8ff4_f17772b8b0bbProceduralize the Data Retention ProcessMaintain a procedure by which logs are retained for the period prescribed by your organization, default system documentation is removed, and demonstration applications are removed. Log Retention Configuration Default Documentation Removal Demonstration Application RemovalID_c5e879c9_262e_496e_8ff4_f17772b8b0bbSystem.Compliance.ManualControlActivityProjection
ID_c67f7af3_9d0d_485a_abb7_b1aab624d997Encryption ConfigurationUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure algorithms and their use within the operating system to protect data at rest and in transit.ID_c67f7af3_9d0d_485a_abb7_b1aab624d997Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_c74d0ffb_6911_4bbc_a7c4_de471abf465fSession ConfigurationUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure session parameters to ensure disconnection and resumption occur in a controlled manner to reduce the chances of a compromised session.ID_c74d0ffb_6911_4bbc_a7c4_de471abf465fMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_d2bba4da_e92f_420f_b392_41bc731df21bSystem ServicesUse the WS2003SP2 Certificate Services Server Security Compliance 1.0 baseline to configure the Active Directory Certificate Services (AD CS) role through system services to ensure that only authorized services are enabled.ID_d2bba4da_e92f_420f_b392_41bc731df21bMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_d3789495_3832_44b5_b523_d7ce1658630eSystem ServicesUse the WS2003SP2 Internet Authentication Services Security Compliance 1.0 baseline to configure the Internet Authentication Services role through system services to ensure that only authorized services are enabled.ID_d3789495_3832_44b5_b523_d7ce1658630eMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_d72ca42f_37c6_4163_aa49_e41db42f9e9bConfigure EncryptionThis control activity guides the IT professional through configuring the use of FIPS-compliant protocols and algorithms within the operating system.ID_d72ca42f_37c6_4163_aa49_e41db42f9e9bSystem.Compliance.ManualControlActivityProjection
ID_dd49af71_f03a_4e91_a9a4_850b0d8c2d93Identity ManagementUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure accounts to prevent the use of duplicate identities, in order to allow the organization to determine which individual is associated with a specific action performed by an account.ID_dd49af71_f03a_4e91_a9a4_850b0d8c2d93Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_de9686f8_c37d_4fae_90d3_b70610e2b2a2Protocol ConfigurationUse the WS2003SP2 Member Server Security Compliance 1.0 baseline to configure the local operating system protocol settings to ensure only authorized protocols are used and that their attack profiles are minimized.ID_de9686f8_c37d_4fae_90d3_b70610e2b2a2Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_e15cd04e_4245_4f93_9a76_e50ed2adbec8Configure Local Time and Clock ParametersThis control activity guides the IT professional through the process of configuring a Windows Server 2008 server as an authoritative time server.ID_e15cd04e_4245_4f93_9a76_e50ed2adbec8System.Compliance.ManualControlActivityProjection
ID_e412bf05_f8e0_42f7_b906_f11141404ed7Log Access LimitationUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure roles and rights management so that only authorized accounts may access operating system logs to prevent information disclosure or changing the log contents.ID_e412bf05_f8e0_42f7_b906_f11141404ed7Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_e85ac1cd_b886_4e69_819f_15d2b46e91a3System IntegrityUse the WS2003SP2 Domain Controller Security Compliance 1.0 baseline to configure settings that log conditions affecting the integrity of a system, such as whether it is infected, improperly configured, or unable to log events.ID_e85ac1cd_b886_4e69_819f_15d2b46e91a3Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_e9f8337e_27b9_4224_be66_6c77a72229f4Configure User Notification ParametersThis control activity guides the IT professional through the configuration of local operating system settings that control warning banners.ID_e9f8337e_27b9_4224_be66_6c77a72229f4System.Compliance.ManualControlActivityProjection
ID_ec7871cf_2af1_48d0_b7cd_fc741c485997Proceduralize Error and Fault LoggingMonitor for qualified errors and faults within deployed assets.ID_ec7871cf_2af1_48d0_b7cd_fc741c485997System.Compliance.ManualControlActivityProjection
ID_ee01620d_dd71_4cdf_8bc5_72ff12264dfeConfigure Network Security ParametersThis control activity guides the IT professional through configuring anti-spoofing network settings within the operating system.ID_ee01620d_dd71_4cdf_8bc5_72ff12264dfeSystem.Compliance.ManualControlActivityProjection
ID_ee195bb4_aaf6_4e3a_9566_f33f93013f68Proceduralize the Authorization of ServicesMaintain a procedure by which services are authorized for enablement.ID_ee195bb4_aaf6_4e3a_9566_f33f93013f68System.Compliance.ManualControlActivityProjection
ID_f1fccb33_8b78_4f30_9e3c_09a9fe67f6c6Configure Data Backup FunctionalityThis control activity guides the IT professional through configuration of the local operating system data backup settings.ID_f1fccb33_8b78_4f30_9e3c_09a9fe67f6c6System.Compliance.ManualControlActivityProjection
ID_f8260793_1879_4513_b429_1939e9e41d23Configure Authentication TypesThis control activity guides the IT professional through configuration of two-factor authentication.ID_f8260793_1879_4513_b429_1939e9e41d23System.Compliance.ManualControlActivityProjection