🪟 Windows 11 Hardening
Apply official hardening guides and security configurations for Windows 11 systems
Overview
This page provides access to hardening guides and helps you apply security configurations to Windows 11 systems. The primary reference is the Australian Cyber Security Centre (ACSC) Windows 11 Workstation Hardening Guide, which provides comprehensive security hardening recommendations.
Each section below references specific areas of the ACSC guide and provides guidance on applying the recommended security settings. Follow the official guides and apply configurations systematically to improve your security posture.
Required Tools
ISM System Hardening Controls
The following ISM controls from the "Guidelines for system hardening" section should be applied to Windows 11 systems. Each control includes guidance on how to implement it on Windows 11.
Vendors that have demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices, are used for operating systems.
Windows 11 Implementation:
If you're using Windows 11 for your Operating System, you can use the following narrative in the SSP:
The organisation uses operating systems from reputable vendors (Microsoft) with well-established Secure-by-Design and Secure-by-Default engineering practices.
Microsoft implements comprehensive secure development lifecycle processes, mandatory code review, fuzzing, compiler hardening, and vulnerability response processes.
While their operating systems are not yet written predominantly in memory-safe languages (e.g., Rust, Go), Microsoft employs industry-leading memory-safety mitigations including ASLR, CFI, stack hardening, and kernel isolation.
The latest release, or the previous release, of operating systems are used.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Where supported, 64-bit versions of operating systems are used.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
SOEs are used for workstations and servers.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
SOEs provided by third parties are scanned for malicious code and configurations.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
SOEs are reviewed and updated at least annually.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Approved configurations for operating systems are developed, implemented and maintained.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Operating systems are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Default user accounts or credentials for operating systems, including for any pre-configured user accounts, are changed, disabled or removed during initial setup.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Unneeded user accounts, components, services and functionality of operating systems are disabled or removed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Automatic execution features for removable media are disabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Internet Explorer 11 is disabled or removed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
.NET Framework 3.5 (includes .NET 2.0 and 3.0) is disabled or removed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Operating system exploit protection functionality is enabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Early Launch Antimalware, Secure Boot, Trusted Boot and Measured Boot functionality is enabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Unprivileged users are prevented from bypassing, disabling or modifying security functionality of operating systems.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Unprivileged users are prevented from running script execution engines, including: - Windows Script Host (cscript.exe and wscript.exe) - PowerShell (powershell.exe, powershell_ise.exe and pwsh.exe) - Command Prompt (cmd.exe) - Windows Management Instrumentation (wmic.exe) - Microsoft Hypertext Markup Language (HTML) Application Host (mshta.exe).
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Unprivileged users do not have the ability to install unapproved applications.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Unprivileged users do not have the ability to uninstall or disable approved applications.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Application control is implemented on workstations.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Application control is implemented on internet-facing servers.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Application control is implemented on non-internet-facing servers.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Application control is applied to user profiles and temporary folders used by operating systems, web browsers and email clients.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Application control is applied to all locations other than user profiles and temporary folders used by operating systems, web browsers and email clients.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Application control restricts the execution of drivers to an organisation-approved set.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Application control is implemented using cryptographic hash rules, publisher certificate rules or path rules.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When implementing application control using publisher certificate rules, publisher names and product names are used.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When implementing application control using path rules, only approved users can modify approved files and write to approved folders.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When implementing application control using path rules, only approved users can change file system permissions for approved files and folders.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft’s recommended application blocklist is implemented.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft’s vulnerable driver blocklist is implemented.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Application control rulesets are validated on an annual or more frequent basis.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
All users (with the exception of local administrator accounts and break glass accounts) cannot disable, bypass or be exempted from application control.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Allowed and blocked application control events are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Command line process creation events are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Windows PowerShell 2.0 is disabled or removed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
PowerShell is configured to use Constrained Language Mode.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
PowerShell module logging, script block logging and transcription events are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
PowerShell script block logs are protected by Protected Event Logging functionality.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
A HIPS or EDR solution is implemented on workstations.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
A HIPS or EDR solution is implemented on critical servers and high-value servers.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
A software firewall is implemented on workstations and servers to restrict inbound and outbound network connections to an organisation-approved set of applications and services.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
An antivirus application is implemented on workstations and servers with: - signature-based detection functionality enabled and set to a high level - heuristic-based detection functionality enabled and set to a high level - reputation rating functionality enabled - ransomware protection functionality enabled - detection signatures configured to update on at least a daily basis - regular scanning configured for all fixed disks and removable media.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
If there is no business requirement for reading from removable media and devices, such functionality is disabled via the use of a device access control application or by disabling external communication interfaces.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
If there is no business requirement for writing to removable media and devices, such functionality is disabled via the use of a device access control application or by disabling external communication interfaces.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
External communication interfaces that allow DMA are disabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Security-relevant events for Apple macOS operating systems are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Security-relevant events for Linux operating systems are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Security-relevant events for Microsoft Windows operating systems are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Vendors that have demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices, are used for user applications.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The latest release of office productivity suites, web browsers and their extensions, email clients, PDF applications, and security products are used.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Approved configurations for user applications are developed, implemented and maintained.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Default user accounts or credentials for user applications, including for any pre-configured user accounts, are changed, disabled or removed during initial setup.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Unneeded components, services and functionality of office productivity suites, web browsers, email clients, PDF applications and security products are disabled or removed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Add-ons, extensions and plug-ins for office productivity suites, web browsers, email clients, PDF applications and security products are restricted to an organisation-approved set.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office is blocked from creating child processes.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office is blocked from creating executable content.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office is blocked from injecting code into other processes.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office is configured to prevent activation of Object Linking and Embedding packages.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Office productivity suites are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Office productivity suite security settings cannot be changed by users.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Web browsers do not process Java from the internet.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Web browsers do not process web advertisements from the internet.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Web browsers are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Web browser security settings cannot be changed by users.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
PDF applications are blocked from creating child processes.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
PDF applications are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
PDF application security settings cannot be changed by users.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft’s attack surface reduction rules are implemented.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Email client security settings cannot be changed by users.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Security product security settings cannot be changed by users.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office macros are disabled for users that do not have a demonstrated business requirement.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office macros in files originating from the internet are blocked.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office macro antivirus scanning is enabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office macros are blocked from making Win32 API calls.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Only Microsoft Office macros running from within a sandboxed environment, a Trusted Location or that are digitally signed by a trusted publisher are allowed to execute.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office macros are checked to ensure they are free of malicious code before being digitally signed or placed within Trusted Locations.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Only privileged users responsible for checking that Microsoft Office macros are free of malicious code can write to and modify content within Trusted Locations.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office macros digitally signed by an untrusted publisher cannot be enabled via the Message Bar or Backstage View.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office macros digitally signed by signatures other than V3 signatures cannot be enabled via the Message Bar or Backstage View.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office’s list of trusted publishers is validated on an annual or more frequent basis.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft Office macro security settings cannot be changed by users.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Vendors that have demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices, are used for server applications.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The latest release of internet-facing server applications are used.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Approved configurations for server applications are developed, implemented and maintained.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Server applications are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Default user accounts or credentials for server applications, including for any pre-configured user accounts, are changed, disabled or removed during initial setup.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Unneeded user accounts, components, services and functionality of server applications are disabled or removed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
All temporary installation files and logs created during server application installation processes are removed after server applications have been installed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Server applications are configured to run as a separate user account with the minimum privileges needed to perform their functions.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The user accounts under which server applications run have limited access to their underlying server’s file system.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft AD DS domain controllers, Microsoft AD CS CA servers, Microsoft AD FS servers and Microsoft Entra Connect servers are only used for their designed role and no other applications or services are installed, unless they are security related.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Access to Microsoft AD DS domain controllers, Microsoft AD CS CA servers, Microsoft AD FS servers and Microsoft Entra Connect servers is limited to privileged users that require access.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Backups of Microsoft AD DS domain controllers, Microsoft AD CS CA servers, Microsoft AD FS servers and Microsoft Entra Connect servers are encrypted, stored securely and only accessible to backup administrator accounts.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Security-relevant events for Microsoft AD DS domain controllers, Microsoft AD CS CA servers, Microsoft AD FS servers and Microsoft Entra Connect servers are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft AD DS domain controllers are administered using dedicated domain administrator user accounts that are not used to administer other systems.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Lightweight Directory Access Protocol signing is enabled on Microsoft AD DS domain controllers.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The Print Spooler service is disabled on Microsoft AD DS domain controllers.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Passwords are not stored in Group Policy Preferences.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Passwords are prevented from being stored in Group Policy Preferences.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
SID Filtering is enabled for domain and forest trusts.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Only service accounts and computer accounts are configured with Service Principal Names (SPNs).
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The number of service accounts configured with an SPN is minimised.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Service accounts configured with an SPN do not have DCSync permissions.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Service accounts configured with an SPN use the Advanced Encryption Standard for encryption.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Duplicate SPNs do not exist within the domain.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
User accounts are provisioned with the minimum privileges required.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
User accounts with DCSync permissions are reviewed at least annually, and those without an ongoing requirement for the permissions have them removed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Privileged user accounts are configured as sensitive and cannot be delegated.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Computer accounts are not configured for unconstrained delegation.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
User accounts require Kerberos pre-authentication.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
User accounts are not configured with password never expires or password not required.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The UserPassword attribute for user accounts is not used.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The sIDHistory attribute for user accounts is not used.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
User accounts are checked at least weekly for the presence of the sIDHistory attribute.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Account properties accessible by unprivileged users are not used to store passwords.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
User account passwords do not use reversible encryption.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Unprivileged user accounts cannot add machines to the domain.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Dedicated privileged service accounts are used to add machines to the domain.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
User accounts with unconstrained delegation are reviewed at least annually, and those without an SPN or demonstrated business requirement are removed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Computer accounts that are not Microsoft AD DS domain controllers are not trusted for delegation to services.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The Domain Computers security group does not have write or modify permissions to any Microsoft Active Directory objects.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Privileged user accounts are members of the Protected Users security group.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The number of user accounts that are members of the Domain Admins, Enterprise Admins or other highly-privileged security groups is minimised.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Service accounts are not members of the Domain Admins, Enterprise Admins or other highly-privileged security groups.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Computer accounts are not members of the Domain Admins, Enterprise Admins or other highly-privileged security groups.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The Domain Computers security group is not a member of any privileged or highly-privileged security groups.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When a user account is disabled, it is removed from all security group memberships.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The Pre-Windows 2000 Compatible Access security group does not contain user accounts.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Strong mapping between certificates and users is enforced.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The EDITF_ATTRIBUTESUBJECTALTNAME2 flag is removed from Microsoft AD CS CA configurations.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
The CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is removed from certificate templates.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Unprivileged user accounts do not have write access to certificate templates.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Extended Key Usages that enable user authentication are removed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
CA Certificate Manager approval is required for certificate templates that allow a Subject Alternative Name to be supplied.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft AD FS servers are administered using a dedicated service account that is not used to administer other systems.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Soft matching between Microsoft AD DS and Microsoft Entra ID is disabled following initial synchronisation activities.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Hard match takeover is disabled for Microsoft Entra Connect servers.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Privileged user accounts are not synchronised between Microsoft AD DS and Microsoft Entra ID.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Security-relevant events for server applications on internet-facing servers are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Security-relevant events for server applications on non-internet-facing servers are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Users are authenticated before they are granted access to a system and its resources.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Authentication methods susceptible to replay attacks are disabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
LAN Manager and NT LAN Manager authentication methods are disabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication is used to authenticate users to their organisation’s online services that process, store or communicate their organisation’s sensitive data.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication is used to authenticate users to third-party online services that process, store or communicate their organisation’s sensitive data.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication (where available) is used to authenticate users to third-party online services that process, store or communicate their organisation’s non-sensitive data.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication is used to authenticate users to their organisation’s online customer services that process, store or communicate their organisation’s sensitive customer data.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication is used to authenticate users to third-party online customer services that process, store or communicate their organisation’s sensitive customer data.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication is used to authenticate customers to online customer services that process, store or communicate sensitive customer data.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When multi-factor authentication is used to authenticate users or customers to online services or online customer services, all other authentication protocols that do not support multi-factor authentication are disabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication is used to authenticate privileged users of systems.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication is used to authenticate unprivileged users of systems.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication is used to authenticate users of data repositories.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication used for authenticating users of online services is phishing-resistant.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication used for authenticating customers of online customer services provides a phishing-resistant option.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication used for authenticating customers of online customer services is phishing-resistant.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication used for authenticating users of systems is phishing-resistant.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Multi-factor authentication used for authenticating users of data repositories is phishing-resistant.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Memorised secrets used for multi-factor authentication on non-classified, OFFICIAL: Sensitive and PROTECTED systems are a minimum of 6 characters.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Memorised secrets used for multi-factor authentication on SECRET systems are a minimum of 8 characters.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Memorised secrets used for multi-factor authentication on TOP SECRET systems are a minimum of 10 characters.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When phishing-resistant multi-factor authentication is used by user accounts, other non-phishing-resistant multi-factor authentication options are disabled for such user accounts.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When multi-factor authentication is used to authenticate users to online services, online customer services, systems or data repositories – that process, store or communicate their organisation’s sensitive data or sensitive customer data – users are prevented from self-enrolling into multi-factor authentication from untrustworthy devices.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Successful and unsuccessful multi-factor authentication events are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When systems cannot support multi-factor authentication, single-factor authentication using passphrases is implemented instead.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Passphrases used for single-factor authentication on non-classified, OFFICIAL: Sensitive and PROTECTED systems are at least 4 random words with a total minimum length of 15 characters.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Passphrases used for single-factor authentication on SECRET systems are at least 5 random words with a total minimum length of 17 characters.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Passphrases used for single-factor authentication on TOP SECRET systems are at least 6 random words with a total minimum length of 20 characters.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Passphrases used for single-factor authentication are not a list of categorised words; do not form a real sentence in a natural language; and are not constructed from song lyrics, movies, literature or any other publicly available material.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Successful and unsuccessful single-factor authentication events are centrally logged.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Users provide sufficient evidence to verify their identity when requesting new credentials.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials set for user accounts are randomly generated.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials are provided to users via a secure communications channel or, if not possible, split into two parts with one part provided to users and the other part provided to supervisors.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials provided to users are changed on first use.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials, in the form of memorised secrets, are not reused by users across different systems.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials for the built-in Administrator account in each domain are long, unique, unpredictable and managed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials for break glass accounts, local administrator accounts and service accounts are long, unique, unpredictable and managed.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials for built-in Administrator accounts, break glass accounts, local administrator accounts and service accounts are a minimum of 30 characters.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials for built-in Administrator accounts, break glass accounts, local administrator accounts and service accounts are randomly generated.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Service accounts are created as group Managed Service Accounts.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials for user accounts are changed if: - they are compromised - they are suspected of being compromised - they are discovered stored on networks in the clear - they are discovered being transferred across networks in the clear - membership of a shared user account changes - they have not been changed in the past 12 months.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials for computer accounts are changed if: - they are compromised - they are suspected of being compromised - they have not been changed in the past 30 days.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials for the Kerberos Key Distribution Center’s service account (KRBTGT) are changed twice, allowing for replication to all Microsoft AD DS domain controllers in-between each change, if: - the domain has been directly compromised - the domain is suspected of being compromised - they have not been changed in the past 12 months.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Microsoft AD FS token-signing and encryption certificates are changed twice in quick succession if: - they are compromised - they are suspected of being compromised - they have not been changed in the past 12 months.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials are obscured as they are entered into systems.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credential hint functionality is not used for systems.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Physical credentials are kept separate from systems they are used to authenticate to, except for when performing authentication activities.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credentials stored on systems are protected by a password manager; a hardware security module; or by salting, hashing and stretching them before storage within a database.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Private keys for Microsoft AD CS CA servers are protected by a hardware security module.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Memory integrity functionality is enabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Local Security Authority protection functionality is enabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Credential Guard functionality is enabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Remote Credential Guard functionality is enabled.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Cached credentials are limited to one previous logon.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Networks are scanned at least monthly to identify any credentials that are being stored in the clear.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
User accounts, except for break glass accounts, are locked out after a maximum of five failed logon attempts.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
On a daily basis, outside of business hours and after an appropriate period of inactivity, user sessions are terminated and workstations are restarted.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Services are configured with a session lock that: - activates after a maximum of 15 minutes of user inactivity, a maximum of 12 hours of overall session time or when manually activated by users - blocks access to all session content - requires users to re-authenticate using all authentication factors to unlock the session - denies users the ability to disable the session locking mechanism.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Systems are configured with a screen lock that: - activates after a maximum of 15 minutes of user inactivity, or when manually activated by users - conceals all content on the screen - ensures that the screen does not enter a power saving state before the screen lock is activated - requires users to re-authenticate using all authentication factors to unlock the system - denies users the ability to disable the screen locking mechanism.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
Systems have a logon banner that reminds users of their security responsibilities when accessing the system and its resources.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When using a software-based isolation mechanism to share a physical server’s hardware, the isolation mechanism is from a vendor that has demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When using a software-based isolation mechanism to share a physical server’s hardware, the configuration of the isolation mechanism is hardened by removing unneeded functionality and restricting access to the administrative interface used to manage the isolation mechanism.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When using a software-based isolation mechanism to share a physical server’s hardware, the underlying operating system is hardened.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When using a software-based isolation mechanism to share a physical server’s hardware, patches, updates or vendor mitigations for vulnerabilities are applied to the isolation mechanism and underlying operating system in a timely manner.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When using a software-based isolation mechanism to share a physical server’s hardware, the isolation mechanism or underlying operating system is replaced when it is no longer supported by a vendor.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When using a software-based isolation mechanism to share a physical server’s hardware, integrity monitoring and centralised event logging is performed for the isolation mechanism and underlying operating system.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.
When using a software-based isolation mechanism to share a physical server’s hardware for SECRET or TOP SECRET computing environments, the physical server and all computing environments are of the same classification and belong to the same security domain.
Windows 11 Implementation:
Guidance on applying this control to Windows 11 will be added here.