🪟 Windows 11 Hardening

Apply official hardening guides and security configurations for Windows 11 systems

Overview

This page provides access to hardening guides and helps you apply security configurations to Windows 11 systems. The primary reference is the Australian Cyber Security Centre (ACSC) Windows 11 Workstation Hardening Guide, which provides comprehensive security hardening recommendations.

Each section below references specific areas of the ACSC guide and provides guidance on applying the recommended security settings. Follow the official guides and apply configurations systematically to improve your security posture.

Required Tools

💿
WinPE
Windows Preinstallation Environment
📜
Validation Script
Automated validation and testing
🖥️
Windows 11 ISO
Official Windows 11 installation media

ISM System Hardening Controls

The following ISM controls from the "Guidelines for system hardening" section should be applied to Windows 11 systems. Each control includes guidance on how to implement it on Windows 11.

Showing 210 of 210 controls
ISM-1743
Rev. 2 Updated: Mar-25
NC O:S P S TS

Vendors that have demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices, are used for operating systems.

Windows 11 Implementation:

If you're using Windows 11 for your Operating System, you can use the following narrative in the SSP:

The organisation uses operating systems from reputable vendors (Microsoft) with well-established Secure-by-Design and Secure-by-Default engineering practices.

Microsoft implements comprehensive secure development lifecycle processes, mandatory code review, fuzzing, compiler hardening, and vulnerability response processes.

While their operating systems are not yet written predominantly in memory-safe languages (e.g., Rust, Go), Microsoft employs industry-leading memory-safety mitigations including ASLR, CFI, stack hardening, and kernel isolation.

ISM-1407
Rev. 5 Updated: Dec-22
NC O:S P S TS

The latest release, or the previous release, of operating systems are used.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1408
Rev. 5 Updated: Dec-22
NC O:S P S TS

Where supported, 64-bit versions of operating systems are used.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1406
Rev. 2 Updated: Aug-20
NC O:S P S TS

SOEs are used for workstations and servers.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1608
Rev. 1 Updated: Mar-22
NC O:S P S TS

SOEs provided by third parties are scanned for malicious code and configurations.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1588
Rev. 0 Updated: Aug-20
NC O:S P S TS

SOEs are reviewed and updated at least annually.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1914
Rev. 0 Updated: Mar-24
NC O:S P S TS

Approved configurations for operating systems are developed, implemented and maintained.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1409
Rev. 4 Updated: Dec-23
NC O:S P S TS

Operating systems are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0383
Rev. 11 Updated: Jun-25
NC O:S P S TS

Default user accounts or credentials for operating systems, including for any pre-configured user accounts, are changed, disabled or removed during initial setup.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0380
Rev. 10 Updated: Dec-24
NC O:S P S TS

Unneeded user accounts, components, services and functionality of operating systems are disabled or removed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0341
Rev. 4 Updated: Dec-21
NC O:S P S TS

Automatic execution features for removable media are disabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1654
Rev. 0 Updated: Sep-21
NC O:S P S TS

Internet Explorer 11 is disabled or removed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1655
Rev. 0 Updated: Sep-21
NC O:S P S TS

.NET Framework 3.5 (includes .NET 2.0 and 3.0) is disabled or removed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1492
Rev. 2 Updated: Mar-22
NC O:S P S TS

Operating system exploit protection functionality is enabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1745
Rev. 0 Updated: Mar-22
NC O:S P S TS

Early Launch Antimalware, Secure Boot, Trusted Boot and Measured Boot functionality is enabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1584
Rev. 1 Updated: Sep-21
NC O:S P S TS

Unprivileged users are prevented from bypassing, disabling or modifying security functionality of operating systems.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1491
Rev. 3 Updated: Mar-22
NC O:S P S TS

Unprivileged users are prevented from running script execution engines, including: - Windows Script Host (cscript.exe and wscript.exe) - PowerShell (powershell.exe, powershell_ise.exe and pwsh.exe) - Command Prompt (cmd.exe) - Windows Management Instrumentation (wmic.exe) - Microsoft Hypertext Markup Language (HTML) Application Host (mshta.exe).

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1592
Rev. 2 Updated: Jun-25
NC O:S P S TS

Unprivileged users do not have the ability to install unapproved applications.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0382
Rev. 8 Updated: Jun-25
NC O:S P S TS

Unprivileged users do not have the ability to uninstall or disable approved applications.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0843
Rev. 9 Updated: Sep-21
NC O:S P S TS

Application control is implemented on workstations.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1490
Rev. 3 Updated: Sep-21
NC O:S P S TS

Application control is implemented on internet-facing servers.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1656
Rev. 0 Updated: Sep-21
NC O:S P S TS

Application control is implemented on non-internet-facing servers.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1870
Rev. 0 Updated: Sep-23
NC O:S P S TS

Application control is applied to user profiles and temporary folders used by operating systems, web browsers and email clients.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1871
Rev. 0 Updated: Sep-23
NC O:S P S TS

Application control is applied to all locations other than user profiles and temporary folders used by operating systems, web browsers and email clients.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1657
Rev. 0 Updated: Sep-21
NC O:S P S TS

Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1658
Rev. 0 Updated: Sep-21
NC O:S P S TS

Application control restricts the execution of drivers to an organisation-approved set.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0955
Rev. 6 Updated: Apr-20
NC O:S P S TS

Application control is implemented using cryptographic hash rules, publisher certificate rules or path rules.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1471
Rev. 3 Updated: Jun-24
NC O:S P S TS

When implementing application control using publisher certificate rules, publisher names and product names are used.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1392
Rev. 4 Updated: Mar-23
NC O:S P S TS

When implementing application control using path rules, only approved users can modify approved files and write to approved folders.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1746
Rev. 1 Updated: Mar-23
NC O:S P S TS

When implementing application control using path rules, only approved users can change file system permissions for approved files and folders.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1544
Rev. 3 Updated: Dec-23
NC O:S P S TS

Microsoft’s recommended application blocklist is implemented.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1659
Rev. 1 Updated: Dec-23
NC O:S P S TS

Microsoft’s vulnerable driver blocklist is implemented.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1582
Rev. 1 Updated: Sep-21
NC O:S P S TS

Application control rulesets are validated on an annual or more frequent basis.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0846
Rev. 8 Updated: Mar-22
NC O:S P S TS

All users (with the exception of local administrator accounts and break glass accounts) cannot disable, bypass or be exempted from application control.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1660
Rev. 2 Updated: Dec-23
NC O:S P S TS

Allowed and blocked application control events are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1889
Rev. 0 Updated: Dec-23
NC O:S P S TS

Command line process creation events are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1621
Rev. 1 Updated: Sep-21
NC O:S P S TS

Windows PowerShell 2.0 is disabled or removed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1622
Rev. 0 Updated: Oct-20
NC O:S P S TS

PowerShell is configured to use Constrained Language Mode.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1623
Rev. 1 Updated: Dec-23
NC O:S P S TS

PowerShell module logging, script block logging and transcription events are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1624
Rev. 0 Updated: Oct-20
NC O:S P S TS

PowerShell script block logs are protected by Protected Event Logging functionality.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1341
Rev. 3 Updated: Mar-25
NC O:S P S TS

A HIPS or EDR solution is implemented on workstations.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1034
Rev. 8 Updated: Mar-25
NC O:S P S TS

A HIPS or EDR solution is implemented on critical servers and high-value servers.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1416
Rev. 3 Updated: Mar-22
NC O:S P S TS

A software firewall is implemented on workstations and servers to restrict inbound and outbound network connections to an organisation-approved set of applications and services.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1417
Rev. 5 Updated: Jun-25
NC O:S P S TS

An antivirus application is implemented on workstations and servers with: - signature-based detection functionality enabled and set to a high level - heuristic-based detection functionality enabled and set to a high level - reputation rating functionality enabled - ransomware protection functionality enabled - detection signatures configured to update on at least a daily basis - regular scanning configured for all fixed disks and removable media.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1418
Rev. 5 Updated: Jun-25
NC O:S P S TS

If there is no business requirement for reading from removable media and devices, such functionality is disabled via the use of a device access control application or by disabling external communication interfaces.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0343
Rev. 7 Updated: Jun-25
NC O:S P S TS

If there is no business requirement for writing to removable media and devices, such functionality is disabled via the use of a device access control application or by disabling external communication interfaces.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0345
Rev. 6 Updated: Dec-21
NC O:S P S TS

External communication interfaces that allow DMA are disabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1976
Rev. 0 Updated: Dec-24
NC O:S P S TS

Security-relevant events for Apple macOS operating systems are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1977
Rev. 0 Updated: Dec-24
NC O:S P S TS

Security-relevant events for Linux operating systems are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0582
Rev. 10 Updated: Dec-24
NC O:S P S TS

Security-relevant events for Microsoft Windows operating systems are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0938
Rev. 7 Updated: Mar-25
NC O:S P S TS

Vendors that have demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices, are used for user applications.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1467
Rev. 4 Updated: Jun-25
NC O:S P S TS

The latest release of office productivity suites, web browsers and their extensions, email clients, PDF applications, and security products are used.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1915
Rev. 0 Updated: Mar-24
NC O:S P S TS

Approved configurations for user applications are developed, implemented and maintained.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1806
Rev. 4 Updated: Jun-25
NC O:S P S TS

Default user accounts or credentials for user applications, including for any pre-configured user accounts, are changed, disabled or removed during initial setup.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1470
Rev. 6 Updated: Jun-25
NC O:S P S TS

Unneeded components, services and functionality of office productivity suites, web browsers, email clients, PDF applications and security products are disabled or removed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1235
Rev. 5 Updated: Jun-25
NC O:S P S TS

Add-ons, extensions and plug-ins for office productivity suites, web browsers, email clients, PDF applications and security products are restricted to an organisation-approved set.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1667
Rev. 0 Updated: Sep-21
NC O:S P S TS

Microsoft Office is blocked from creating child processes.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1668
Rev. 0 Updated: Sep-21
NC O:S P S TS

Microsoft Office is blocked from creating executable content.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1669
Rev. 0 Updated: Sep-21
NC O:S P S TS

Microsoft Office is blocked from injecting code into other processes.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1542
Rev. 0 Updated: Jan-19
NC O:S P S TS

Microsoft Office is configured to prevent activation of Object Linking and Embedding packages.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1859
Rev. 2 Updated: Dec-23
NC O:S P S TS

Office productivity suites are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1823
Rev. 0 Updated: Mar-23
NC O:S P S TS

Office productivity suite security settings cannot be changed by users.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1486
Rev. 1 Updated: Sep-21
NC O:S P S TS

Web browsers do not process Java from the internet.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1485
Rev. 1 Updated: Sep-21
NC O:S P S TS

Web browsers do not process web advertisements from the internet.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1412
Rev. 6 Updated: Dec-23
NC O:S P S TS

Web browsers are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1585
Rev. 2 Updated: Mar-23
NC O:S P S TS

Web browser security settings cannot be changed by users.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1670
Rev. 1 Updated: Jun-25
NC O:S P S TS

PDF applications are blocked from creating child processes.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1860
Rev. 3 Updated: Jun-25
NC O:S P S TS

PDF applications are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1824
Rev. 1 Updated: Jun-25
NC O:S P S TS

PDF application security settings cannot be changed by users.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1601
Rev. 1 Updated: Mar-22
NC O:S P S TS

Microsoft’s attack surface reduction rules are implemented.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1748
Rev. 1 Updated: Mar-23
NC O:S P S TS

Email client security settings cannot be changed by users.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1825
Rev. 0 Updated: Mar-23
NC O:S P S TS

Security product security settings cannot be changed by users.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1671
Rev. 0 Updated: Sep-21
NC O:S P S TS

Microsoft Office macros are disabled for users that do not have a demonstrated business requirement.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1488
Rev. 1 Updated: Sep-21
NC O:S P S TS

Microsoft Office macros in files originating from the internet are blocked.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1672
Rev. 0 Updated: Sep-21
NC O:S P S TS

Microsoft Office macro antivirus scanning is enabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1673
Rev. 0 Updated: Sep-21
NC O:S P S TS

Microsoft Office macros are blocked from making Win32 API calls.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1674
Rev. 0 Updated: Sep-21
NC O:S P S TS

Only Microsoft Office macros running from within a sandboxed environment, a Trusted Location or that are digitally signed by a trusted publisher are allowed to execute.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1890
Rev. 0 Updated: Dec-23
NC O:S P S TS

Microsoft Office macros are checked to ensure they are free of malicious code before being digitally signed or placed within Trusted Locations.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1487
Rev. 2 Updated: Dec-23
NC O:S P S TS

Only privileged users responsible for checking that Microsoft Office macros are free of malicious code can write to and modify content within Trusted Locations.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1675
Rev. 0 Updated: Sep-21
NC O:S P S TS

Microsoft Office macros digitally signed by an untrusted publisher cannot be enabled via the Message Bar or Backstage View.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1891
Rev. 0 Updated: Dec-23
NC O:S P S TS

Microsoft Office macros digitally signed by signatures other than V3 signatures cannot be enabled via the Message Bar or Backstage View.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1676
Rev. 0 Updated: Sep-21
NC O:S P S TS

Microsoft Office’s list of trusted publishers is validated on an annual or more frequent basis.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1489
Rev. 0 Updated: Sep-18
NC O:S P S TS

Microsoft Office macro security settings cannot be changed by users.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1826
Rev. 1 Updated: Mar-25
NC O:S P S TS

Vendors that have demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices, are used for server applications.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1483
Rev. 2 Updated: Mar-23
NC O:S P S TS

The latest release of internet-facing server applications are used.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1916
Rev. 0 Updated: Mar-24
NC O:S P S TS

Approved configurations for server applications are developed, implemented and maintained.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1246
Rev. 6 Updated: Dec-23
NC O:S P S TS

Server applications are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1260
Rev. 7 Updated: Jun-25
NC O:S P S TS

Default user accounts or credentials for server applications, including for any pre-configured user accounts, are changed, disabled or removed during initial setup.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1247
Rev. 5 Updated: Dec-24
NC O:S P S TS

Unneeded user accounts, components, services and functionality of server applications are disabled or removed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1245
Rev. 3 Updated: Mar-23
NC O:S P S TS

All temporary installation files and logs created during server application installation processes are removed after server applications have been installed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1249
Rev. 4 Updated: Dec-24
NC O:S P S TS

Server applications are configured to run as a separate user account with the minimum privileges needed to perform their functions.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1250
Rev. 3 Updated: Dec-24
NC O:S P S TS

The user accounts under which server applications run have limited access to their underlying server’s file system.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1926
Rev. 0 Updated: Sep-24
NC O:S P S TS

Microsoft AD DS domain controllers, Microsoft AD CS CA servers, Microsoft AD FS servers and Microsoft Entra Connect servers are only used for their designed role and no other applications or services are installed, unless they are security related.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1927
Rev. 0 Updated: Sep-24
NC O:S P S TS

Access to Microsoft AD DS domain controllers, Microsoft AD CS CA servers, Microsoft AD FS servers and Microsoft Entra Connect servers is limited to privileged users that require access.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1928
Rev. 0 Updated: Sep-24
NC O:S P S TS

Backups of Microsoft AD DS domain controllers, Microsoft AD CS CA servers, Microsoft AD FS servers and Microsoft Entra Connect servers are encrypted, stored securely and only accessible to backup administrator accounts.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1830
Rev. 2 Updated: Sep-24
NC O:S P S TS

Security-relevant events for Microsoft AD DS domain controllers, Microsoft AD CS CA servers, Microsoft AD FS servers and Microsoft Entra Connect servers are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1827
Rev. 0 Updated: Mar-23
NC O:S P S TS

Microsoft AD DS domain controllers are administered using dedicated domain administrator user accounts that are not used to administer other systems.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1929
Rev. 0 Updated: Sep-24
NC O:S P S TS

Lightweight Directory Access Protocol signing is enabled on Microsoft AD DS domain controllers.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1828
Rev. 0 Updated: Mar-23
NC O:S P S TS

The Print Spooler service is disabled on Microsoft AD DS domain controllers.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1829
Rev. 1 Updated: Sep-24
NC O:S P S TS

Passwords are not stored in Group Policy Preferences.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1930
Rev. 0 Updated: Sep-24
NC O:S P S TS

Passwords are prevented from being stored in Group Policy Preferences.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1931
Rev. 0 Updated: Sep-24
NC O:S P S TS

SID Filtering is enabled for domain and forest trusts.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1832
Rev. 0 Updated: Mar-23
NC O:S P S TS

Only service accounts and computer accounts are configured with Service Principal Names (SPNs).

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1932
Rev. 0 Updated: Sep-24
NC O:S P S TS

The number of service accounts configured with an SPN is minimised.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1933
Rev. 0 Updated: Sep-24
NC O:S P S TS

Service accounts configured with an SPN do not have DCSync permissions.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-2010
Rev. 0 Updated: Mar-25
NC O:S P S TS

Service accounts configured with an SPN use the Advanced Encryption Standard for encryption.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1834
Rev. 0 Updated: Mar-23
NC O:S P S TS

Duplicate SPNs do not exist within the domain.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1833
Rev. 1 Updated: Sep-24
NC O:S P S TS

User accounts are provisioned with the minimum privileges required.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1934
Rev. 0 Updated: Sep-24
NC O:S P S TS

User accounts with DCSync permissions are reviewed at least annually, and those without an ongoing requirement for the permissions have them removed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1835
Rev. 0 Updated: Mar-23
NC O:S P S TS

Privileged user accounts are configured as sensitive and cannot be delegated.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1935
Rev. 0 Updated: Sep-24
NC O:S P S TS

Computer accounts are not configured for unconstrained delegation.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1836
Rev. 0 Updated: Mar-23
NC O:S P S TS

User accounts require Kerberos pre-authentication.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1837
Rev. 0 Updated: Mar-23
NC O:S P S TS

User accounts are not configured with password never expires or password not required.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1838
Rev. 0 Updated: Mar-23
NC O:S P S TS

The UserPassword attribute for user accounts is not used.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1936
Rev. 0 Updated: Sep-24
NC O:S P S TS

The sIDHistory attribute for user accounts is not used.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1937
Rev. 0 Updated: Sep-24
NC O:S P S TS

User accounts are checked at least weekly for the presence of the sIDHistory attribute.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1839
Rev. 0 Updated: Mar-23
NC O:S P S TS

Account properties accessible by unprivileged users are not used to store passwords.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1840
Rev. 0 Updated: Mar-23
NC O:S P S TS

User account passwords do not use reversible encryption.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1841
Rev. 0 Updated: Mar-23
NC O:S P S TS

Unprivileged user accounts cannot add machines to the domain.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1842
Rev. 1 Updated: Sep-24
NC O:S P S TS

Dedicated privileged service accounts are used to add machines to the domain.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1843
Rev. 1 Updated: Sep-24
NC O:S P S TS

User accounts with unconstrained delegation are reviewed at least annually, and those without an SPN or demonstrated business requirement are removed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1844
Rev. 0 Updated: Mar-23
NC O:S P S TS

Computer accounts that are not Microsoft AD DS domain controllers are not trusted for delegation to services.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1938
Rev. 0 Updated: Sep-24
NC O:S P S TS

The Domain Computers security group does not have write or modify permissions to any Microsoft Active Directory objects.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1620
Rev. 1 Updated: Mar-23
NC O:S P S TS

Privileged user accounts are members of the Protected Users security group.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1939
Rev. 0 Updated: Sep-24
NC O:S P S TS

The number of user accounts that are members of the Domain Admins, Enterprise Admins or other highly-privileged security groups is minimised.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1940
Rev. 0 Updated: Sep-24
NC O:S P S TS

Service accounts are not members of the Domain Admins, Enterprise Admins or other highly-privileged security groups.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1941
Rev. 0 Updated: Sep-24
NC O:S P S TS

Computer accounts are not members of the Domain Admins, Enterprise Admins or other highly-privileged security groups.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1942
Rev. 0 Updated: Sep-24
NC O:S P S TS

The Domain Computers security group is not a member of any privileged or highly-privileged security groups.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1845
Rev. 0 Updated: Mar-23
NC O:S P S TS

When a user account is disabled, it is removed from all security group memberships.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1846
Rev. 0 Updated: Mar-23
NC O:S P S TS

The Pre-Windows 2000 Compatible Access security group does not contain user accounts.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1943
Rev. 0 Updated: Sep-24
NC O:S P S TS

Strong mapping between certificates and users is enforced.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1944
Rev. 0 Updated: Sep-24
NC O:S P S TS

The EDITF_ATTRIBUTESUBJECTALTNAME2 flag is removed from Microsoft AD CS CA configurations.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1945
Rev. 0 Updated: Sep-24
NC O:S P S TS

The CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is removed from certificate templates.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1946
Rev. 0 Updated: Sep-24
NC O:S P S TS

Unprivileged user accounts do not have write access to certificate templates.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1947
Rev. 0 Updated: Sep-24
NC O:S P S TS

Extended Key Usages that enable user authentication are removed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1948
Rev. 0 Updated: Sep-24
NC O:S P S TS

CA Certificate Manager approval is required for certificate templates that allow a Subject Alternative Name to be supplied.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1949
Rev. 0 Updated: Sep-24
NC O:S P S TS

Microsoft AD FS servers are administered using a dedicated service account that is not used to administer other systems.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1950
Rev. 0 Updated: Sep-24
NC O:S P S TS

Soft matching between Microsoft AD DS and Microsoft Entra ID is disabled following initial synchronisation activities.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1951
Rev. 0 Updated: Sep-24
NC O:S P S TS

Hard match takeover is disabled for Microsoft Entra Connect servers.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1952
Rev. 0 Updated: Sep-24
NC O:S P S TS

Privileged user accounts are not synchronised between Microsoft AD DS and Microsoft Entra ID.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1978
Rev. 0 Updated: Dec-24
NC O:S P S TS

Security-relevant events for server applications on internet-facing servers are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1979
Rev. 0 Updated: Dec-24
NC O:S P S TS

Security-relevant events for server applications on non-internet-facing servers are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1546
Rev. 0 Updated: Aug-19
NC O:S P S TS

Users are authenticated before they are granted access to a system and its resources.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1603
Rev. 0 Updated: Aug-20
NC O:S P S TS

Authentication methods susceptible to replay attacks are disabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1055
Rev. 4 Updated: Oct-20
NC O:S P S TS

LAN Manager and NT LAN Manager authentication methods are disabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1504
Rev. 3 Updated: Dec-23
NC O:S P S TS

Multi-factor authentication is used to authenticate users to their organisation’s online services that process, store or communicate their organisation’s sensitive data.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1679
Rev. 1 Updated: Sep-23
NC O:S P S TS

Multi-factor authentication is used to authenticate users to third-party online services that process, store or communicate their organisation’s sensitive data.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1680
Rev. 1 Updated: Sep-23
NC O:S P S TS

Multi-factor authentication (where available) is used to authenticate users to third-party online services that process, store or communicate their organisation’s non-sensitive data.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1892
Rev. 0 Updated: Dec-23
NC O:S P S TS

Multi-factor authentication is used to authenticate users to their organisation’s online customer services that process, store or communicate their organisation’s sensitive customer data.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1893
Rev. 0 Updated: Dec-23
NC O:S P S TS

Multi-factor authentication is used to authenticate users to third-party online customer services that process, store or communicate their organisation’s sensitive customer data.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1681
Rev. 3 Updated: Dec-23
NC O:S P S TS

Multi-factor authentication is used to authenticate customers to online customer services that process, store or communicate sensitive customer data.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1919
Rev. 0 Updated: Jun-24
NC O:S P S TS

When multi-factor authentication is used to authenticate users or customers to online services or online customer services, all other authentication protocols that do not support multi-factor authentication are disabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1173
Rev. 4 Updated: Sep-21
NC O:S P S TS

Multi-factor authentication is used to authenticate privileged users of systems.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0974
Rev. 6 Updated: Sep-21
NC O:S P S TS

Multi-factor authentication is used to authenticate unprivileged users of systems.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1505
Rev. 3 Updated: Dec-23
NC O:S P S TS

Multi-factor authentication is used to authenticate users of data repositories.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1401
Rev. 5 Updated: Sep-21
NC O:S P S TS

Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1872
Rev. 1 Updated: Dec-23
NC O:S P S TS

Multi-factor authentication used for authenticating users of online services is phishing-resistant.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1873
Rev. 1 Updated: Dec-23
NC O:S P S TS

Multi-factor authentication used for authenticating customers of online customer services provides a phishing-resistant option.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1874
Rev. 1 Updated: Dec-23
NC O:S P S TS

Multi-factor authentication used for authenticating customers of online customer services is phishing-resistant.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1682
Rev. 3 Updated: Dec-23
NC O:S P S TS

Multi-factor authentication used for authenticating users of systems is phishing-resistant.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1894
Rev. 0 Updated: Dec-23
NC O:S P S TS

Multi-factor authentication used for authenticating users of data repositories is phishing-resistant.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1559
Rev. 3 Updated: Dec-24
NC O:S P

Memorised secrets used for multi-factor authentication on non-classified, OFFICIAL: Sensitive and PROTECTED systems are a minimum of 6 characters.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1560
Rev. 2 Updated: Mar-22
S

Memorised secrets used for multi-factor authentication on SECRET systems are a minimum of 8 characters.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1561
Rev. 2 Updated: Mar-22
TS

Memorised secrets used for multi-factor authentication on TOP SECRET systems are a minimum of 10 characters.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-2011
Rev. 0 Updated: Mar-25
NC O:S P S TS

When phishing-resistant multi-factor authentication is used by user accounts, other non-phishing-resistant multi-factor authentication options are disabled for such user accounts.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1920
Rev. 0 Updated: Jun-24
NC O:S P S TS

When multi-factor authentication is used to authenticate users to online services, online customer services, systems or data repositories – that process, store or communicate their organisation’s sensitive data or sensitive customer data – users are prevented from self-enrolling into multi-factor authentication from untrustworthy devices.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1683
Rev. 2 Updated: Dec-23
NC O:S P S TS

Successful and unsuccessful multi-factor authentication events are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0417
Rev. 5 Updated: Oct-19
NC O:S P S TS

When systems cannot support multi-factor authentication, single-factor authentication using passphrases is implemented instead.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0421
Rev. 10 Updated: Dec-24
NC O:S P

Passphrases used for single-factor authentication on non-classified, OFFICIAL: Sensitive and PROTECTED systems are at least 4 random words with a total minimum length of 15 characters.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1557
Rev. 2 Updated: Dec-21
S

Passphrases used for single-factor authentication on SECRET systems are at least 5 random words with a total minimum length of 17 characters.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0422
Rev. 8 Updated: Dec-21
TS

Passphrases used for single-factor authentication on TOP SECRET systems are at least 6 random words with a total minimum length of 20 characters.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1558
Rev. 2 Updated: Mar-22
NC O:S P S TS

Passphrases used for single-factor authentication are not a list of categorised words; do not form a real sentence in a natural language; and are not constructed from song lyrics, movies, literature or any other publicly available material.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1895
Rev. 0 Updated: Dec-23
NC O:S P S TS

Successful and unsuccessful single-factor authentication events are centrally logged.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1593
Rev. 1 Updated: Mar-22
NC O:S P S TS

Users provide sufficient evidence to verify their identity when requesting new credentials.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1227
Rev. 5 Updated: Mar-22
NC O:S P S TS

Credentials set for user accounts are randomly generated.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1594
Rev. 1 Updated: Mar-22
NC O:S P S TS

Credentials are provided to users via a secure communications channel or, if not possible, split into two parts with one part provided to users and the other part provided to supervisors.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1595
Rev. 1 Updated: Mar-22
NC O:S P S TS

Credentials provided to users are changed on first use.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1596
Rev. 2 Updated: Dec-22
NC O:S P S TS

Credentials, in the form of memorised secrets, are not reused by users across different systems.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1953
Rev. 0 Updated: Sep-24
NC O:S P S TS

Credentials for the built-in Administrator account in each domain are long, unique, unpredictable and managed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1685
Rev. 2 Updated: Jun-23
NC O:S P S TS

Credentials for break glass accounts, local administrator accounts and service accounts are long, unique, unpredictable and managed.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1795
Rev. 2 Updated: Sep-24
NC O:S P S TS

Credentials for built-in Administrator accounts, break glass accounts, local administrator accounts and service accounts are a minimum of 30 characters.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1954
Rev. 0 Updated: Sep-24
NC O:S P S TS

Credentials for built-in Administrator accounts, break glass accounts, local administrator accounts and service accounts are randomly generated.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1619
Rev. 0 Updated: Oct-20
NC O:S P S TS

Service accounts are created as group Managed Service Accounts.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1590
Rev. 3 Updated: Sep-24
NC O:S P S TS

Credentials for user accounts are changed if: - they are compromised - they are suspected of being compromised - they are discovered stored on networks in the clear - they are discovered being transferred across networks in the clear - membership of a shared user account changes - they have not been changed in the past 12 months.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1955
Rev. 0 Updated: Sep-24
NC O:S P S TS

Credentials for computer accounts are changed if: - they are compromised - they are suspected of being compromised - they have not been changed in the past 30 days.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1847
Rev. 0 Updated: Mar-23
NC O:S P S TS

Credentials for the Kerberos Key Distribution Center’s service account (KRBTGT) are changed twice, allowing for replication to all Microsoft AD DS domain controllers in-between each change, if: - the domain has been directly compromised - the domain is suspected of being compromised - they have not been changed in the past 12 months.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1956
Rev. 0 Updated: Sep-24
NC O:S P S TS

Microsoft AD FS token-signing and encryption certificates are changed twice in quick succession if: - they are compromised - they are suspected of being compromised - they have not been changed in the past 12 months.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1597
Rev. 0 Updated: Aug-20
NC O:S P S TS

Credentials are obscured as they are entered into systems.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1980
Rev. 0 Updated: Dec-24
NC O:S P S TS

Credential hint functionality is not used for systems.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0418
Rev. 7 Updated: Dec-24
NC O:S P S TS

Physical credentials are kept separate from systems they are used to authenticate to, except for when performing authentication activities.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1402
Rev. 6 Updated: Mar-22
NC O:S P S TS

Credentials stored on systems are protected by a password manager; a hardware security module; or by salting, hashing and stretching them before storage within a database.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1957
Rev. 0 Updated: Sep-24
NC O:S P S TS

Private keys for Microsoft AD CS CA servers are protected by a hardware security module.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1896
Rev. 0 Updated: Dec-23
NC O:S P S TS

Memory integrity functionality is enabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1861
Rev. 2 Updated: Dec-23
NC O:S P S TS

Local Security Authority protection functionality is enabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1686
Rev. 1 Updated: Dec-23
NC O:S P S TS

Credential Guard functionality is enabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1897
Rev. 0 Updated: Dec-23
NC O:S P S TS

Remote Credential Guard functionality is enabled.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1749
Rev. 0 Updated: Mar-22
NC O:S P S TS

Cached credentials are limited to one previous logon.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1875
Rev. 0 Updated: Sep-23
NC O:S P S TS

Networks are scanned at least monthly to identify any credentials that are being stored in the clear.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1403
Rev. 4 Updated: Dec-24
NC O:S P S TS

User accounts, except for break glass accounts, are locked out after a maximum of five failed logon attempts.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0853
Rev. 3 Updated: Sep-22
NC O:S P S TS

On a daily basis, outside of business hours and after an appropriate period of inactivity, user sessions are terminated and workstations are restarted.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0428
Rev. 10 Updated: Mar-25
NC O:S P S TS

Services are configured with a session lock that: - activates after a maximum of 15 minutes of user inactivity, a maximum of 12 hours of overall session time or when manually activated by users - blocks access to all session content - requires users to re-authenticate using all authentication factors to unlock the session - denies users the ability to disable the session locking mechanism.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-2012
Rev. 0 Updated: Mar-25
NC O:S P S TS

Systems are configured with a screen lock that: - activates after a maximum of 15 minutes of user inactivity, or when manually activated by users - conceals all content on the screen - ensures that the screen does not enter a power saving state before the screen lock is activated - requires users to re-authenticate using all authentication factors to unlock the system - denies users the ability to disable the screen locking mechanism.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-0408
Rev. 5 Updated: Sep-23
NC O:S P S TS

Systems have a logon banner that reminds users of their security responsibilities when accessing the system and its resources.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1460
Rev. 5 Updated: Mar-25
NC O:S P S TS

When using a software-based isolation mechanism to share a physical server’s hardware, the isolation mechanism is from a vendor that has demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1604
Rev. 0 Updated: Aug-20
NC O:S P S TS

When using a software-based isolation mechanism to share a physical server’s hardware, the configuration of the isolation mechanism is hardened by removing unneeded functionality and restricting access to the administrative interface used to manage the isolation mechanism.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1605
Rev. 1 Updated: Mar-22
NC O:S P S TS

When using a software-based isolation mechanism to share a physical server’s hardware, the underlying operating system is hardened.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1606
Rev. 2 Updated: Sep-23
NC O:S P S TS

When using a software-based isolation mechanism to share a physical server’s hardware, patches, updates or vendor mitigations for vulnerabilities are applied to the isolation mechanism and underlying operating system in a timely manner.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1848
Rev. 0 Updated: Mar-23
NC O:S P S TS

When using a software-based isolation mechanism to share a physical server’s hardware, the isolation mechanism or underlying operating system is replaced when it is no longer supported by a vendor.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1607
Rev. 1 Updated: Dec-24
NC O:S P S TS

When using a software-based isolation mechanism to share a physical server’s hardware, integrity monitoring and centralised event logging is performed for the isolation mechanism and underlying operating system.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.

ISM-1461
Rev. 5 Updated: Mar-22
S TS

When using a software-based isolation mechanism to share a physical server’s hardware for SECRET or TOP SECRET computing environments, the physical server and all computing environments are of the same classification and belong to the same security domain.

Windows 11 Implementation:

Guidance on applying this control to Windows 11 will be added here.