last sync: 2025-Apr-29 17:16:02 UTC

Windows machines should meet requirements for 'Security Options - Microsoft Network Server'

Azure BuiltIn Policy definition

Source Azure Portal
Display name Windows machines should meet requirements for 'Security Options - Microsoft Network Server'
Id caf2d518-f029-4f6b-833b-d7081702f253
Version 3.0.0
Details on versioning
Versioning Versions supported for Versioning: 1
3.0.0
Built-in Versioning [Preview]
Category Guest Configuration
Microsoft Learn
Description Windows machines should have the specified Group Policy settings in the category 'Security Options - Microsoft Network Server' for disabling SMB v1 server. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol.
Cloud environments AzureCloud = true
AzureUSGovernment = true
AzureChinaCloud = unknown
Available in AzUSGov The Policy is available in AzureUSGovernment cloud. Version: '2.0.0'
Repository: Azure-Policy caf2d518-f029-4f6b-833b-d7081702f253
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
RBAC role(s) none
Rule aliases IF (7)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Compute/imageOffer Microsoft.Compute
Microsoft.Compute
Microsoft.Compute
virtualMachines
virtualMachineScaleSets
disks
properties.storageProfile.imageReference.offer
properties.virtualMachineProfile.storageProfile.imageReference.offer
properties.creationData.imageReference.id
True
True
True


False
False
False
Microsoft.Compute/imagePublisher Microsoft.Compute
Microsoft.Compute
Microsoft.Compute
virtualMachines
virtualMachineScaleSets
disks
properties.storageProfile.imageReference.publisher
properties.virtualMachineProfile.storageProfile.imageReference.publisher
properties.creationData.imageReference.id
True
True
True


False
False
False
Microsoft.Compute/imageSKU Microsoft.Compute
Microsoft.Compute
Microsoft.Compute
virtualMachines
virtualMachineScaleSets
disks
properties.storageProfile.imageReference.sku
properties.virtualMachineProfile.storageProfile.imageReference.sku
properties.creationData.imageReference.id
True
True
True


False
False
False
Microsoft.Compute/virtualMachines/osProfile.windowsConfiguration Microsoft.Compute virtualMachines properties.osProfile.windowsConfiguration True True
Microsoft.Compute/virtualMachines/storageProfile.osDisk.osType Microsoft.Compute virtualMachines properties.storageProfile.osDisk.osType True True
Microsoft.ConnectedVMwarevSphere/virtualMachines/osProfile.osType Microsoft.ConnectedVMwarevSphere virtualmachines properties.osProfile.osType True False
Microsoft.HybridCompute/imageOffer Microsoft.HybridCompute machines properties.osName True False
THEN-ExistenceCondition (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.GuestConfiguration/guestConfigurationAssignments/complianceStatus Microsoft.GuestConfiguration guestConfigurationAssignments properties.complianceStatus True False
Rule resource types IF (3)
Compliance
The following 32 compliance controls are associated with this Policy definition 'Windows machines should meet requirements for 'Security Options - Microsoft Network Server'' (caf2d518-f029-4f6b-833b-d7081702f253)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Azure_Security_Benchmark_v1.0 1.11 Azure_Security_Benchmark_v1.0_1.11 Azure Security Benchmark 1.11 Network Security Use automated tools to monitor network resource configurations and detect changes Customer Use Azure Policy to validate (and/or remediate) configuration for network resources. How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage Azure Policy samples for networking: https://docs.microsoft.com/azure/governance/policy/samples/#network n/a link 7
CMMC_L2_v1.9.0 CM.L2_3.4.8 CMMC_L2_v1.9.0_CM.L2_3.4.8 Cybersecurity Maturity Model Certification (CMMC) Level 2 v1.9.0 CM.L2 3.4.8 Configuration Management Application Execution Policy Shared Apply deny by exception (blacklisting) policy to prevent the use of unauthorized software or deny all, permit by exception (whitelisting) policy to allow the execution of authorized software. To reduce the risk of malware infections or unauthorized access. 5
EU_2555_(NIS2)_2022 EU_2555_(NIS2)_2022_21 EU_2555_(NIS2)_2022_21 EU 2022/2555 (NIS2) 2022 21 Cybersecurity risk-management measures Shared n/a Requires essential and important entities to take appropriate measures to manage cybersecurity risks. 193
EU_GDPR_2016_679_Art. 24 EU_GDPR_2016_679_Art._24 EU General Data Protection Regulation (GDPR) 2016/679 Art. 24 Chapter 4 - Controller and processor Responsibility of the controller Shared n/a n/a 310
EU_GDPR_2016_679_Art. 25 EU_GDPR_2016_679_Art._25 EU General Data Protection Regulation (GDPR) 2016/679 Art. 25 Chapter 4 - Controller and processor Data protection by design and by default Shared n/a n/a 310
EU_GDPR_2016_679_Art. 28 EU_GDPR_2016_679_Art._28 EU General Data Protection Regulation (GDPR) 2016/679 Art. 28 Chapter 4 - Controller and processor Processor Shared n/a n/a 310
EU_GDPR_2016_679_Art. 32 EU_GDPR_2016_679_Art._32 EU General Data Protection Regulation (GDPR) 2016/679 Art. 32 Chapter 4 - Controller and processor Security of processing Shared n/a n/a 310
FBI_Criminal_Justice_Information_Services_v5.9.5_5 .7 FBI_Criminal_Justice_Information_Services_v5.9.5_5.7 404 not found n/a n/a 95
hipaa 0709.10m1Organizational.1-10.m hipaa-0709.10m1Organizational.1-10.m 0709.10m1Organizational.1-10.m 07 Vulnerability Management 0709.10m1Organizational.1-10.m 10.06 Technical Vulnerability Management Shared n/a Technical vulnerabilities are identified, evaluated for risk, and corrected in a timely manner. 10
HITRUST_CSF_v11.3 10.h HITRUST_CSF_v11.3_10.h HITRUST CSF v11.3 10.h Security of System Files Ensure the security of system files, access to system files and program source code shall be controlled, and IT projects and support activities conducted in a secure manner. Shared The updation of operational software, applications, and program libraries is to be performed by authorized administrators. There shall be procedures in place to control the installation of software on operational systems. 3
NIST_SP_800-171_R3_3 .4.8 NIST_SP_800-171_R3_3.4.8 404 not found n/a n/a 5
NIST_SP_800-53_R5.1.1 CM.7.2 NIST_SP_800-53_R5.1.1_CM.7.2 NIST SP 800-53 R5.1.1 CM.7.2 Configuration Management Control Least Functionality | Prevent Program Execution Shared Prevent program execution in accordance with [Selection (one or more): [Assignment: organization-defined policies, rules of behavior, and/or access agreements regarding software program usage and restrictions] ; rules authorizing the terms and conditions of software program usage]. Prevention of program execution addresses organizational policies, rules of behavior, and/or access agreements that restrict software usage and the terms and conditions imposed by the developer or manufacturer, including software licensing and copyrights. Restrictions include prohibiting auto-execute features, restricting roles allowed to approve program execution, permitting or prohibiting specific software programs, or restricting the number of program instances executed at the same time. 2
NZISM_v3.7 16.4.37.C.01. NZISM_v3.7_16.4.37.C.01. NZISM v3.7 16.4.37.C.01. Privileged Access Management 16.4.37.C.01. - enhance security and reduce the risk of unauthorized access or misuse. Shared n/a Agencies MUST implement a Privileged Access Management (PAM) policy training module as part of the agency's overall user training and awareness requirement. 3
NZISM_v3.7 16.4.37.R.02. NZISM_v3.7_16.4.37.R.02. 404 not found n/a n/a 3
NZISM_v3.7 19.5.29.C.01. NZISM_v3.7_19.5.29.C.01. NZISM v3.7 19.5.29.C.01. Session Border Controllers 19.5.29.C.01. - enhance security measures and protect agency assets. Shared n/a Agencies MUST develop and implement user awareness and training programmes to support and enable safe use of VoIP and UC services. 3
NZISM_v3.7 2.1.49.C.01. NZISM_v3.7_2.1.49.C.01. NZISM v3.7 2.1.49.C.01. Overview of Key Agencies 2.1.49.C.01. - facilitate collaboration and access to resources for effective security management and response. Shared n/a Security personnel MUST familiarise themselves with the information security roles and services provided by New Zealand Government organisations. 4
NZISM_v3.7 3.3.13.C.01. NZISM_v3.7_3.3.13.C.01. NZISM v3.7 3.3.13.C.01. Information Technology Security Managers 3.3.13.C.01. - foster a culture of security awareness and equipping personnel with the knowledge and skills to effectively mitigate security risks. Shared n/a ITSMs SHOULD provide or arrange for the provision of information security awareness and training for all agency personnel. 4
NZISM_v3.7 5.1.12.C.02. NZISM_v3.7_5.1.12.C.02. NZISM v3.7 5.1.12.C.02. Documentation Fundamentals 5.1.12.C.02. - enhance the agency's ability to mitigate risks and minimize disruptions to operations. Shared n/a Agency personnel MUST be trained in and periodically exercise the Incident Response Plan. 4
NZISM_v3.7 5.7.4.C.01. NZISM_v3.7_5.7.4.C.01. NZISM v3.7 5.7.4.C.01. Emergency Procedures 5.7.4.C.01. - ensure the protection of classified information and systems. Shared n/a Agencies MUST include in procedures for personnel evacuating a facility the requirement to secure classified information and systems prior to the evacuation. 4
NZISM_v3.7 9.1.4.C.01. NZISM_v3.7_9.1.4.C.01. NZISM v3.7 9.1.4.C.01. Information Security Awareness and Training 9.1.4.C.01. - enhance the capability to safeguard sensitive information and mitigate security risks effectively. Shared n/a Agency management MUST ensure that all personnel who have access to a system have sufficient training and ongoing information security awareness. 4
NZISM_v3.7 9.1.5.C.01. NZISM_v3.7_9.1.5.C.01. NZISM v3.7 9.1.5.C.01. Information Security Awareness and Training 9.1.5.C.01. - enhance the understanding and adherence to information security policies and procedures, thereby mitigating risks and ensuring compliance with regulations. Shared n/a Agencies MUST provide ongoing information security awareness and a training programme for personnel on topics such as responsibilities, legislation and regulation, consequences of non-compliance with information security policies and procedures, and potential security risks and counter-measures. 1
NZISM_v3.7 9.1.5.C.02. NZISM_v3.7_9.1.5.C.02. NZISM v3.7 9.1.5.C.02. Information Security Awareness and Training 9.1.5.C.02. - foster a culture of security awareness and compliance. Shared n/a Agencies MUST provide information security awareness training as part of their employee induction programmes. 1
NZISM_v3.7 9.1.6.C.01. NZISM_v3.7_9.1.6.C.01. NZISM v3.7 9.1.6.C.01. Information Security Awareness and Training 9.1.6.C.01. - enhance the ability to effectively safeguard information assets and mitigate security risks. Shared n/a Agencies SHOULD align the detail, content and coverage of information security awareness and training programmes to system user responsibilities. 1
NZISM_v3.7 9.1.6.C.02. NZISM_v3.7_9.1.6.C.02. NZISM v3.7 9.1.6.C.02. Information Security Awareness and Training 9.1.6.C.02. - ensure that information security awareness and training programs encompass comprehensive coverage of key topics. Shared n/a Agencies SHOULD ensure that information security awareness and training includes information on: 1. the purpose of the training or awareness program; 2. any legislative or regulatory mandates and requirements; 3. any national or agency policy mandates and requirements; 4. agency security appointments and contacts; 5. the legitimate use of system accounts, software and classified information; 6. the security of accounts, including shared passwords; 7. authorisation requirements for applications, databases and data; 8. the security risks associated with non-agency systems, particularly the Internet; 9. reporting any suspected compromises or anomalies; 10. reporting requirements for information security incidents, suspected compromises or anomalies; 11. classifying, marking, controlling, storing and sanitising media; 12. protecting workstations from unauthorised access; 13. informing the support section when access to a system is no longer needed; 14. observing rules and regulations governing the secure operation and authorised use of systems; and 15. supporting documentation such as SOPs and user guides. 1
NZISM_v3.7 9.1.6.C.03. NZISM_v3.7_9.1.6.C.03. NZISM v3.7 9.1.6.C.03. Information Security Awareness and Training 9.1.6.C.03. - promote adherence to security protocols and minimise the risk of security breaches or compromises. Shared n/a Agencies SHOULD ensure that information security awareness and training includes advice to system users not to attempt to: 1. tamper with the system; 2. bypass, strain or test information security mechanisms; 3. introduce or use unauthorised IT equipment or software on a system; 4. replace items such as keyboards, pointing devices and other peripherals with personal equipment; 5. assume the roles and privileges of others; 6. attempt to gain access to classified information for which they have no authorisation; or 7. relocate equipment without proper authorisation. 1
NZISM_v3.7 9.1.7.C.01. NZISM_v3.7_9.1.7.C.01. NZISM v3.7 9.1.7.C.01. Information Security Awareness and Training 9.1.7.C.01. - maintain a secure operating environment. Shared n/a Agencies MUST provide all system users with familiarisation training on the information security policies and procedures and the secure operation of the system before being granted unsupervised access to the system. 1
NZISM_v3.7 9.1.8.C.01. NZISM_v3.7_9.1.8.C.01. NZISM v3.7 9.1.8.C.01. Information Security Awareness and Training 9.1.8.C.01. - maintain confidentiality and integrity of agency assets. Shared n/a Agencies SHOULD advise personnel attending courses along with non-government personnel not to disclose any details that could be used to compromise agency security. 1
NZISM_v3.7 9.3.4.C.01. NZISM_v3.7_9.3.4.C.01. NZISM v3.7 9.3.4.C.01. Using The Internet 9.3.4.C.01. - safeguard agency systems and data from unauthorized access or compromise. Shared n/a Agencies MUST ensure personnel are instructed to report any suspicious activity, questioning or contact when using the Internet, to an ITSM. 1
SOC_2023 CC2.3 SOC_2023_CC2.3 SOC 2023 CC2.3 Information and Communication Facilitate effective internal communication. Shared n/a Entity to communicate with external parties regarding matters affecting the functioning of internal control. 218
SOC_2023 CC5.3 SOC_2023_CC5.3 SOC 2023 CC5.3 Control Activities Maintain alignment with organizational objectives and regulatory requirements. Shared n/a Entity deploys control activities through policies that establish what is expected and in procedures that put policies into action by establishing Policies and Procedures to Support Deployment of Management’s Directives, Responsibility and Accountability for Executing Policies and Procedures, perform tasks in a timely manner, taking corrective actions, perform using competent personnel and reassess policies and procedures. 229
SOC_2023 CC6.1 SOC_2023_CC6.1 SOC 2023 CC6.1 Logical and Physical Access Controls Mitigate security events and ensuring the confidentiality, integrity, and availability of critical information assets. Shared n/a Entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives by identifying and managing the inventory of information assets, restricting logical access, identification and authentication of users, consider network segmentation, manage points of access, restricting access of information assets, managing identification and authentication, managing credentials for infrastructure and software, using encryption to protect data and protect using encryption keys. 128
SOC_2023 CC7.4 SOC_2023_CC7.4 SOC 2023 CC7.4 Systems Operations Effectively manage security incidents, minimize their impact, and protect assets, operations, and reputation. Shared n/a The entity responds to identified security incidents by: a. Executing a defined incident-response program to understand, contain, remediate, and communicate security incidents by assigning roles and responsibilities; b. Establishing procedures to contain security incidents; c. Mitigating ongoing security incidents, End Threats Posed by Security Incidents; d. Restoring operations; e. Developing and Implementing Communication Protocols for Security Incidents; f. Obtains Understanding of Nature of Incident and Determines Containment Strategy; g. Remediation Identified Vulnerabilities; h. Communicating Remediation Activities; and, i. Evaluating the Effectiveness of Incident Response and periodic incident evaluations. 213
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type polSet in AzUSGov
[Deprecated]: Azure Security Benchmark v1 42a694ed-f65e-42b2-aa9e-8052e9740a92 Regulatory Compliance Deprecated BuiltIn true
[Preview]: Windows machines should meet requirements for the Azure compute security baseline be7a78aa-3e10-4153-a5fd-8c6506dbc821 Guest Configuration Preview BuiltIn true
Cybersecurity Maturity Model Certification (CMMC) Level 2 v1.9.0 a4087154-2edb-4329-b56a-1cc986807f3c Regulatory Compliance GA BuiltIn unknown
EU 2022/2555 (NIS2) 2022 42346945-b531-41d8-9e46-f95057672e88 Regulatory Compliance GA BuiltIn unknown
EU General Data Protection Regulation (GDPR) 2016/679 7326812a-86a4-40c8-af7c-8945de9c4913 Regulatory Compliance GA BuiltIn unknown
FBI Criminal Justice Information Services (CJIS) v5.9.5 4fcabc2a-30b2-4ba5-9fbb-b1a4e08fb721 Regulatory Compliance GA BuiltIn unknown
HITRUST CSF v11.3 e0d47b75-5d99-442a-9d60-07f2595ab095 Regulatory Compliance GA BuiltIn unknown
HITRUST/HIPAA a169a624-5599-4385-a696-c8d643089fab Regulatory Compliance GA BuiltIn unknown
NIST 800-171 R3 38916c43-6876-4971-a4b1-806aa7e55ccc Regulatory Compliance GA BuiltIn unknown
NIST SP 800-53 R5.1.1 60205a79-6280-4e20-a147-e2011e09dc78 Regulatory Compliance GA BuiltIn unknown
NZISM v3.7 4476df0a-18ab-4bfe-b6ad-cccae1cf320f Regulatory Compliance GA BuiltIn unknown
SOC 2023 53ad89f5-8542-49e9-ba81-1cbd686e0d52 Regulatory Compliance GA BuiltIn unknown
History
Date/Time (UTC ymd) (i) Change type Change detail
2022-01-28 17:51:01 change Major (2.0.0 > 3.0.0)
2020-09-15 14:06:41 change Previous DisplayName: [Preview]: Windows machines should meet requirements for 'Security Options - Microsoft Network Server'
2020-08-20 14:05:01 add caf2d518-f029-4f6b-833b-d7081702f253
JSON compare
compare mode: version left: version right:
JSON
api-version=2021-06-01
EPAC