Skip to content

Commit

Permalink
text changes
Browse files Browse the repository at this point in the history
  • Loading branch information
DMedina6 committed Nov 13, 2024
1 parent 19c8f65 commit cbb888e
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 19 deletions.
12 changes: 6 additions & 6 deletions controls/SV-205630.rb
Original file line number Diff line number Diff line change
@@ -1,20 +1,20 @@
control 'SV-205630' do
title 'Windows Server 2019 must have the period of time before the bad logon counter is reset configured to 15 minutes or greater.'
title "Windows Server 2019 must have the period of time before the bad logon counter is reset configured to #{input('pass_lock_time')} minutes or greater."
desc 'The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the period of time that must pass after failed logon attempts before the counter is reset to "0". The smaller this value is, the less effective the account lockout feature will be in protecting the local system.'
desc 'check', 'Verify the effective setting in Local Group Policy Editor.
desc 'check', "Verify the effective setting in Local Group Policy Editor.
Run "gpedit.msc".
Run \"gpedit.msc\".
Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy.
If the "Reset account lockout counter after" value is less than "15" minutes, this is a finding.
If the \"Reset account lockout counter after\" value is less than \"#{input('pass_lock_time')}\" minutes, this is a finding.
For server core installations, run the following command:
Secedit /Export /Areas SecurityPolicy /CFG C:\\Path\\FileName.Txt
If "ResetLockoutCount" is less than "15" in the file, this is a finding.'
desc 'fix', 'Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Reset account lockout counter after" to at least "15" minutes.'
If \"ResetLockoutCount\" is less than \"#{input('pass_lock_time')}\" in the file, this is a finding."
desc 'fix', "Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> \"Reset account lockout counter after\" to at least \"#{input('pass_lock_time')}\" minutes."
impact 0.5
ref 'DPMS Target Microsoft Windows Server 2019'
tag severity: 'medium'
Expand Down
16 changes: 8 additions & 8 deletions controls/SV-205795.rb
Original file line number Diff line number Diff line change
@@ -1,24 +1,24 @@
control 'SV-205795' do
title 'Windows Server 2019 account lockout duration must be configured to 15 minutes or greater.'
title "Windows Server 2019 account lockout duration must be configured to #{input('pass_lock_duration')} minutes or greater."
desc 'The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the period of time that an account will remain locked after the specified number of failed logon attempts.'
desc 'check', 'Verify the effective setting in Local Group Policy Editor.
desc 'check', "Verify the effective setting in Local Group Policy Editor.
Run "gpedit.msc".
Run \"gpedit.msc\".
Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy.
If the "Account lockout duration" is less than "15" minutes (excluding "0"), this is a finding.
If the \"Account lockout duration\" is less than \"#{input('pass_lock_duration')}\" minutes (excluding \"0\"), this is a finding.
For server core installations, run the following command:
Secedit /Export /Areas SecurityPolicy /CFG C:\\Path\\FileName.Txt
If "LockoutDuration" is less than "15" (excluding "0") in the file, this is a finding.
If \"LockoutDuration\" is less than \"#{input('pass_lock_duration')}\" (excluding \"0\") in the file, this is a finding.
Configuring this to "0", requiring an administrator to unlock the account, is more restrictive and is not a finding.'
desc 'fix', 'Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout duration" to "15" minutes or greater.
Configuring this to \"0\", requiring an administrator to unlock the account, is more restrictive and is not a finding."
desc 'fix', "Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> \"Account lockout duration\" to \"#{input('pass_lock_duration')}\" minutes or greater.
A value of "0" is also acceptable, requiring an administrator to unlock the account.'
A value of \"0\" is also acceptable, requiring an administrator to unlock the account."
impact 0.5
ref 'DPMS Target Microsoft Windows Server 2019'
tag severity: 'medium'
Expand Down
10 changes: 5 additions & 5 deletions inspec.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,12 +28,12 @@ inputs:
value:
-

- name: temporary_account_period # V-92975
- name: temporary_account_period # SV-205624
desc: "List the number of days that temporary accounts remain active for"
type: Numeric
value: 3

- name: emergency_accounts_domain # V-92977
- name: emergency_accounts_domain # SV-205710
desc: "List of emergency accounts on the domain"
type: Array
value:
Expand All @@ -50,17 +50,17 @@ inputs:
type: Numeric
value: 3

- name: max_pass_lockout # V-93141
- name: max_pass_lockout # SV-205629
desc: "Account lockout threshold is recommended to be 3 or less invalid logon attempts [3]"
type: Numeric
value: 3

- name: pass_lock_time # V-93143
- name: pass_lock_time # SV-205630
desc: "List the number of minutes before a session is locked out [15]"
type: Numeric
value: 15

- name: pass_lock_duration # V-93145
- name: pass_lock_duration # SV-205795
desc: "List the number of minutes for account lockout duration"
type: Numeric
value: 15
Expand Down

0 comments on commit cbb888e

Please sign in to comment.