All Object Templates in Microsoft.ControlActivity.XPSP3.Library Management Pack

 DisplayNameDescriptionIDType
ID_0713c02e_370e_4574_b2ce_936e72c42a83Identity ManagementUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure accounts to prevent the use of duplicate identities, in order to allow the organization to determine which individual is associated with a specific action performed by an account.ID_0713c02e_370e_4574_b2ce_936e72c42a83Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_081c1360_4c15_4499_916d_ac38090b9f99Configure Authorized ProtocolsThis control activity guides the IT professional through configuration of the local operating system protocol settings.ID_081c1360_4c15_4499_916d_ac38090b9f99System.Compliance.ManualControlActivityProjection
ID_0f815b9f_81c1_499a_9548_f3df1132ba6cSystem ServicesUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure workstation system services to ensure that only authorized services are enabled.ID_0f815b9f_81c1_499a_9548_f3df1132ba6cMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_139ef24d_c049_44df_b603_844e263af265Proceduralize Event Consolidation, Correlation, and Recreation through LogsConsolidate, correlate, and recreate events using the Windows Event Log.ID_139ef24d_c049_44df_b603_844e263af265System.Compliance.ManualControlActivityProjection
ID_169133b3_e2d8_4a23_b306_490e71bd7051Configure Local Firewall ParametersThis control activity guides the IT professional through configuration of the local operating system firewall.ID_169133b3_e2d8_4a23_b306_490e71bd7051System.Compliance.ManualControlActivityProjection
ID_17b61d57_d402_4b85_b65e_383771644aa8Proceduralize the Configuration of System Security ParametersMaintain a procedure by which operating system kernel security, system virtual memory clearing, and stack protection is managed.ID_17b61d57_d402_4b85_b65e_383771644aa8System.Compliance.ManualControlActivityProjection
ID_21090494_bafd_4258_b4ac_d99292428f15Event LoggingUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure the Event Log service to ensure that events relevant to compliance are recorded so that they may be used to investigate compliance violations.ID_21090494_bafd_4258_b4ac_d99292428f15Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_26d2b6eb_0281_4eb0_9735_c0983ce3a494Remote AccessUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure remote access methods and access rights to ensure that only authorized accounts may remotely log on to a workstation.ID_26d2b6eb_0281_4eb0_9735_c0983ce3a494Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_2ccd499d_2348_49ce_9463_940b30848804System DefaultsUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure domain server default accounts and authentication values to nondefault accounts and values to prevent unauthorized access with commonly known credentials.ID_2ccd499d_2348_49ce_9463_940b30848804Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_327bf33a_d253_4582_9f90_5eba0ce09d92Proceduralize Remote Access Connectivity ManagementMaintain a procedure to facilitate authorized remote access connectivity and to prevent unapproved remote access methods.ID_327bf33a_d253_4582_9f90_5eba0ce09d92System.Compliance.ManualControlActivityProjection
ID_37b20c41_438c_4b40_832d_f491e94c89a1Logging ConfigurationUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure the Event Log service to ensure availability and transactional integrity to ensure that all transactions are able to log any errors.ID_37b20c41_438c_4b40_832d_f491e94c89a1Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_391a783c_d7e8_4d67_9342_be5bd0882eecProceduralize the Restriction of Access to LogsMaintain a procedure to ensure that access to system logs is restricted to authorized personnel.ID_391a783c_d7e8_4d67_9342_be5bd0882eecSystem.Compliance.ManualControlActivityProjection
ID_460dfe54_f0fb_43f1_90d0_789d94b70d7bProceduralize the Preservation of Original Log FilesMaintain a logging function of assets that creates reference copies of log files to support investigations without affecting original log files.ID_460dfe54_f0fb_43f1_90d0_789d94b70d7bSystem.Compliance.ManualControlActivityProjection
ID_5151d52d_25d7_4e15_a500_c9c3451fcca4Log Meaningful EventsThis control activity guides the IT professional through configuration of the Event Log service to ensure that events that are relevant to compliance are recorded. Such events include the creation/modification/deletion of files, directories, and user accounts.ID_5151d52d_25d7_4e15_a500_c9c3451fcca4System.Compliance.ManualControlActivityProjection
ID_518907c0_9a7e_4ba9_b2fc_58b76174f7e5Key ManagementUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure encryption key use and storage within the operating system to prevent unauthorized access.ID_518907c0_9a7e_4ba9_b2fc_58b76174f7e5Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_60144ebe_f39c_4207_a92f_de9d2a24f6d0Authentication TypesUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure two-factor authentication to prevent unauthorized access if an account ID and password is compromised.ID_60144ebe_f39c_4207_a92f_de9d2a24f6d0Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_68a7964d_ca98_4a9d_8800_8b6097b1e933User NotificationUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure the workstation to display a logon banner that clearly states authorized personnel and authorized actions for the workstation.ID_68a7964d_ca98_4a9d_8800_8b6097b1e933Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_749c76ee_de46_46b7_9279_b61e719c8530Protocol ConfigurationUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure the local operating system protocol settings to ensure only authorized protocols are used and that their attack profiles are minimized.ID_749c76ee_de46_46b7_9279_b61e719c8530Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_76704dc8_456c_486e_8cbf_d33ed2eccce9Account LockUse the WinXPSP3 Domain Security Compliance 1.0 baseline to configure user authentication to lock accounts after unsuccessful logon attempts in order to reduce the chance of brute-force attacks.ID_76704dc8_456c_486e_8cbf_d33ed2eccce9Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_786a34c1_6e6f_4fed_9eb7_f6b242fac17bProceduralize the Monitoring of Access to Sensitive DataMaintain a procedure to monitor access to sensitive data as defined by the organization's data classification or equivalent policy.ID_786a34c1_6e6f_4fed_9eb7_f6b242fac17bSystem.Compliance.ManualControlActivityProjection
ID_79fe5a81_7020_4a13_b08a_e5a32b740e50Password AttributesUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure account password parameters to address password format, visibility, and lifespan to reduce the chance of brute-force or shoulder-surfing compromises.ID_79fe5a81_7020_4a13_b08a_e5a32b740e50Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_7de60968_31ca_47ba_a4c7_62bd8aeaa918Password AttributesUse the WinXPSP3 Domain Security Compliance 1.0 baseline to configure account password parameters to address password format, visibility, and lifespan to reduce the chance of brute-force or shoulder-surfing compromises.ID_7de60968_31ca_47ba_a4c7_62bd8aeaa918Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_86657a03_8eb4_4c54_b200_0f13703f005dName ResolutionMaintain a procedure by which domain name service is configured to an authorized source, limited to authorized zone transfer recipients, and configured for redundancy.ID_86657a03_8eb4_4c54_b200_0f13703f005dSystem.Compliance.ManualControlActivityProjection
ID_8c237e92_f346_4913_b14e_ad139d6d507fNetwork ProtectionUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure anti-spoofing network settings within the operating system.ID_8c237e92_f346_4913_b14e_ad139d6d507fMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_952126ea_a126_47a1_ac4d_e5348c6c61c3Session ConfigurationUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure session parameters to ensure disconnection and resumption occur in a controlled manner to reduce the chances of a compromised session.ID_952126ea_a126_47a1_ac4d_e5348c6c61c3Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_a5f005fa_787c_4d9c_979a_fe7c1faaf489Proceduralize the Data Classification ProcessMaintain a procedure by which sensitive or personal data is classified, and labelled.ID_a5f005fa_787c_4d9c_979a_fe7c1faaf489System.Compliance.ManualControlActivityProjection
ID_a819bfec_7f1e_4097_8762_963765509287Proceduralize Vendor Access ManagementMaintain a procedure to allow asset administrators to grant access to vendors for a required specified duration to conduct legitimate work by creating or enabling vendor accounts that are associated with the individuals performing the work.ID_a819bfec_7f1e_4097_8762_963765509287System.Compliance.ManualControlActivityProjection
ID_b0c61d31_19cd_41cd_8376_c032c2bd48a7Configure SNMP ParametersThis control activity guides the IT professional through a process to reconfigure default SNMP values to custom values.ID_b0c61d31_19cd_41cd_8376_c032c2bd48a7System.Compliance.ManualControlActivityProjection
ID_b4c87e61_288b_497d_94f1_4ea0e9c04d38Proceduralize Access Lock ManagementMaintain a procedure that allows asset administrators to remove access locks that are triggered by access attempt failures.ID_b4c87e61_288b_497d_94f1_4ea0e9c04d38System.Compliance.ManualControlActivityProjection
ID_c38661a4_6654_4e6e_a847_ce6c25790739File SystemUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure roles and rights management to prevent non-administrative access to operating system files in order to enable segregation of duties between administrators and users.ID_c38661a4_6654_4e6e_a847_ce6c25790739Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_c5e879c9_262e_496e_8ff4_f17772b8b0bbProceduralize the Data Retention ProcessMaintain a procedure by which logs are retained for the period prescribed by your organization, default system documentation is removed, and demonstration applications are removed. Log Retention Configuration Default Documentation Removal Demonstration Application RemovalID_c5e879c9_262e_496e_8ff4_f17772b8b0bbSystem.Compliance.ManualControlActivityProjection
ID_d0447d67_d8fc_48d1_8fef_e3bad6183599Encryption ConfigurationUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure algorithms and their use within the operating system to protect data at rest and in transit.ID_d0447d67_d8fc_48d1_8fef_e3bad6183599Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_e15cd04e_4245_4f93_9a76_e50ed2adbec8Configure Local Time and Clock ParametersThis control activity guides the IT professional through the process of configuring a Windows Server 2008 server as an authoritative time server.ID_e15cd04e_4245_4f93_9a76_e50ed2adbec8System.Compliance.ManualControlActivityProjection
ID_e9f8337e_27b9_4224_be66_6c77a72229f4Configure User Notification ParametersThis control activity guides the IT professional through the configuration of local operating system settings that control warning banners.ID_e9f8337e_27b9_4224_be66_6c77a72229f4System.Compliance.ManualControlActivityProjection
ID_eb73df9a_1b66_4e49_a7fb_f84c36b77921Log Access LimitationUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure roles and rights management so that only authorized accounts may access operating system logs to prevent information disclosure or changing the log contents.ID_eb73df9a_1b66_4e49_a7fb_f84c36b77921Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_ec88d8e4_2a60_4293_bed4_bbe056682322System IntegrityUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure settings that log conditions affecting the integrity of a system, such as whether it is infected, improperly configured, or unable to log events.ID_ec88d8e4_2a60_4293_bed4_bbe056682322Microsoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_ecb4e6c5_0ba3_4bf0_b074_cc2df8ec55bdLeast FunctionalityUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure operating system features and functionality to only those necessary and authorized by the organization, in order to narrow the operating system's attack surface.ID_ecb4e6c5_0ba3_4bf0_b074_cc2df8ec55bdMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection
ID_ee195bb4_aaf6_4e3a_9566_f33f93013f68Proceduralize the Authorization of ServicesMaintain a procedure by which services are authorized for enablement.ID_ee195bb4_aaf6_4e3a_9566_f33f93013f68System.Compliance.ManualControlActivityProjection
ID_f8260793_1879_4513_b429_1939e9e41d23Configure Authentication TypesThis control activity guides the IT professional through configuration of two-factor authentication.ID_f8260793_1879_4513_b429_1939e9e41d23System.Compliance.ManualControlActivityProjection
ID_faefce7a_c1f8_43a5_9b9e_0a3233558d8aLeast PrivilegeUse the WinXPSP3 Computer Security Compliance 1.0 baseline to configure roles and rights management to reduce available actions to only those authorized by the organization.ID_faefce7a_c1f8_43a5_9b9e_0a3233558d8aMicrosoft.SystemCenter.ConfigurationManager.ControlActivityProjection