Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dec24 Issue Updates #106

Merged
merged 2 commits into from
Dec 13, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 8 additions & 0 deletions ChangeLog.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,14 @@

## Release 2.0.1

December 2024 Update
- Fixed title for 18.9.27.1
- Issue Addressed:
- [#106](https://github.com/ansible-lockdown/Windows-2019-CIS/issues/105) - Thanks @animatco
- [#104](https://github.com/ansible-lockdown/Windows-2019-CIS/issues/104) - Thanks @devallan
- [#103](https://github.com/ansible-lockdown/Windows-2019-CIS/issues/103) - Thanks @Crombell95
- [#101](https://github.com/ansible-lockdown/Windows-2019-CIS/issues/101) - Thanks @dennisharder-alight

June 2024 Update
- Issue Addressed:
- [#101] (https://github.com/ansible-lockdown/Windows-2019-CIS/issues/101) - Thank you @dennisharder-alight
Expand Down
26 changes: 13 additions & 13 deletions tasks/section01.yml
Original file line number Diff line number Diff line change
Expand Up @@ -109,6 +109,19 @@
- patch
- password

- name: "1.1.6 | PATCH | Ensure Relax minimum password length limits is set to Enabled."
community.windows.win_security_policy:
section: System Access
key: RelaxMinimumPasswordLengthLimits
value: 1
when:
- win19cis_rule_1_1_6
tags:
- level1-memberserver
- rule_1.1.6
- patch
- password

- name: "1.1.4 | PATCH | Ensure Minimum password length is set to 14 or more characters"
block:
- name: "1.1.4 | AUDIT | Ensure Minimum password length is set to 14 or more characters | Warning Check For Variable Standards."
Expand Down Expand Up @@ -154,19 +167,6 @@
- patch
- password

- name: "1.1.6 | PATCH | Ensure Relax minimum password length limits is set to Enabled."
community.windows.win_security_policy:
section: System Access
key: RelaxMinimumPasswordLengthLimits
value: 1
when:
- win19cis_rule_1_1_6
tags:
- level1-memberserver
- rule_1.1.6
- patch
- password

# We have found the order of tasks varies between cloud-based instances and VM-based instances.
# The task below loads the control group in the correct order for cloud-based systems
- name:
Expand Down
50 changes: 44 additions & 6 deletions tasks/section02.yml
Original file line number Diff line number Diff line change
Expand Up @@ -862,7 +862,7 @@
- win19cis_rule_2_3_1_5
tags:
- level1-domaincontroller
- level1-memberservers
- level1-memberserver
- rule_2.3.1.5
- patch
- securitypolicy
Expand Down Expand Up @@ -1618,11 +1618,49 @@
- patch

- name: "2.3.10.9 | PATCH | Configure Network access Remotely accessible registry paths and sub-paths"
ansible.windows.win_regedit:
path: HKLM:\System\Currentcontrolset\Control\Securepipeservers\Winreg\Allowedpaths
name: "Machine"
data: ['System\CurrentControlSet\Control\Print\Printers', 'System\CurrentControlSet\Services\Eventlog', 'Software\Microsoft\OLAP Server', 'Software\Microsoft\Windows NT\CurrentVersion\Print', 'Software\Microsoft\Windows NT\CurrentVersion\Windows', 'System\CurrentControlSet\Control\ContentIndex', 'System\CurrentControlSet\Control\Terminal Server', 'System\CurrentControlSet\Control\Terminal Server\UserConfig', 'System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration', 'Software\Microsoft\Windows NT\CurrentVersion\Perflib', 'System\CurrentControlSet\Services\WINS', 'System\CurrentControlSet\Services\CertSvc', 'System\CurrentControlSet\Services\SysmonLog']
type: multistring
block:
- name: "2.3.10.9 | PATCH | Configure Network access Remotely accessible registry paths and sub-paths | Set Fact"
ansible.builtin.set_fact:
rule_2_3_10_9_remote_registry_paths: [
'System\CurrentControlSet\Control\Print\Printers',
'System\CurrentControlSet\Services\Eventlog',
'Software\Microsoft\OLAP Server',
'Software\Microsoft\Windows NT\CurrentVersion\Print',
'Software\Microsoft\Windows NT\CurrentVersion\Windows',
'System\CurrentControlSet\Control\ContentIndex',
'System\CurrentControlSet\Control\Terminal Server',
'System\CurrentControlSet\Control\Terminal Server\UserConfig',
'System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration',
'Software\Microsoft\Windows NT\CurrentVersion\Perflib',
'System\CurrentControlSet\Services\SysmonLog'
]

- name: "2.3.10.9 | AUDIT | Configure Network access Remotely accessible registry paths and sub-paths | Check if AD Certificate Services feature is installed."
community.windows.win_feature_info:
name: AD-Certificate
register: rule_2_3_10_9_adcs_feature

- name: 2.3.10.9 | PATCH | Configure Network access Remotely accessible registry paths and sub-paths | Add CertSvc to paths."
ansible.builtin.set_fact:
rule_2_3_10_9_remote_registry_paths: "{{ remote_registry_paths + ['System\\CurrentControlSet\\Services\\CertSvc'] }}"
when: rule_2_3_10_9_adcs_feature.features[0].installed

- name: 2.3.10.9 | AUDIT | Configure Network access Remotely accessible registry paths and sub-paths | Check if WINS feature is installed."
community.windows.win_feature_info:
name: WINS
register: rule_2_3_10_9_wins_feature

- name: 2.3.10.9 | PATCH | Configure Network access Remotely accessible registry paths and sub-paths | Add WINS to paths."
ansible.builtin.set_fact:
rule_2_3_10_9_remote_registry_paths: "{{ remote_registry_paths + ['System\\CurrentControlSet\\Services\\WINS'] }}"
when: rule_2_3_10_9_wins_feature.features[0].installed

- name: "2.3.10.9 | PATCH | Configure Network access Remotely accessible registry paths and sub-paths | Apply "
ansible.windows.win_regedit:
path: HKLM:\SYSTEM\Currentcontrolset\Control\Securepipeservers\Winreg\Allowedpaths
name: "Machine"
data: '{{ rule_2_3_10_9_remote_registry_paths }}'
type: multistring
when:
- win19cis_rule_2_3_10_9
tags:
Expand Down
2 changes: 1 addition & 1 deletion tasks/section18.yml
Original file line number Diff line number Diff line change
Expand Up @@ -1605,7 +1605,7 @@
- rule_18.9.26.1
- patch

- name: "18.9.17.1 | PATCH | Ensure Block user from showing account details on sign-in is set to Enabled"
- name: "18.9.27.1 | PATCH | Ensure Block user from showing account details on sign-in is set to Enabled"
ansible.windows.win_regedit:
path: HKLM:\Software\Policies\Microsoft\Windows\System
name: BlockUserFromShowingAccountDetailsOnSignin
Expand Down
Loading