Skip to content

Security settings of Windows Server

This guide provide a quick overview of some of the more relevant Windows Server security settings.

The LGPO used in STACKIT provisioned Windows Server systems is based on our internal STACKIT-Policies and the recommended Microsoft Security Baselines, which are defined in their corresponding security baselines for Windows Server 2016 and Windows Server 2019 (see attached Excel below under workbook “Computer”).

MS Security Baseline Windows 10 and Server 2016.xlsx

MS Security Baseline Windows 10 v1809 and Server 2019.xlsx

All additional optimizations of the STACKIT security settings are listed in detail in the sub space Comparison of Local Policy Settings, where the differences of the standard Microsoft LGPO is compared to the STACKIT LGPO settings for Windows Server 2016 and Windows Server 2019.

A quick overview of some of the more relevant settings is given below:

These security settings are based on Microsofts recommended security baseline for member server and are extended by stricter system hardening to meet the requirements of STACKIT security specifications.

The passwords must meet the following complexity requirements:

  1. Passwords may not contain the user’s samAccountName (account name) value or entire displayName (Full Name value). Both checks aren’t case-sensitive.
  2. The password contains characters from three of the following categories:
    • Uppercase letters of European languages (A through Z, with diacritic marks, Greek and Cyrillic characters)
    • Lowercase letters of European languages (a through z, sharp-s, with diacritic marks, Greek and Cyrillic characters)
    • Base 10 digits (0 through 9)
    • Non-alphanumeric characters (special characters): (\~!@#$%^&*\_-+=``|\(){}[]:;"'<>,.?/) currency symbols such as the Euro or British Pound aren’t counted as special characters for this policy setting.
    • Any unicode character that’s categorized as an alphabetic character but isn’t uppercase or lowercase. This group includes Unicode characters from Asian languages.
SettingValueDescription
MinimumPasswordLength14This security setting determines the least number of characters that a password for a user account may contain.
Maximum Password Age42This security setting determines the period of time (in days), that a password can be used before the system requires the user to change it.
LockoutDuration5This security setting determines the number of minutes a locked-out account remains locked out before automatically becoming unlocked.
ResetLockoutCount5This security setting determines the number of minutes that must elapse after a failed logon attempt before the failed logon attempt counter is reset to 0 bad logon attempts.
LockoutBadCount5This security setting determines the number of failed logon attempts that causes a user account to be locked out. A locked-out account cannot be used until it is reset by an administrator or until the lockout duration for the account has expired.
InactivityTimeoutSecs900Windows notices inactivity of a logon session (RDP/Console), and if the amount of inactive time exceeds the inactivity limit, then the screen saver will run, locking the session.

Standard Windows Secure Channel configuration

Section titled “Standard Windows Secure Channel configuration”

To comply with the high IT security standards of STACKIT the following standard Windows Secure Channel configuration is applied for system hardening purpose on all provided versions of Windows Servers for external customers:

  • Deactivation of Triple DES
  • Minimum key length of Diffie-Hellman encryption set to 2048 bit
  • Deactivation of SSL 2.0
  • Deactivation of SSL 3.0
  • Deactivation of TLS 1.0
  • Deactivation of TLS 1.1
  • Activation of TLS 1.2

Applies for: Windows Server 2016, Windows Server 2019

Info which Regkeys will be set: Standard-SCHANNEL-Settings.txt

Windows Defender Auto Update configuration

Section titled “Windows Defender Auto Update configuration”

Windows Defender is used as the standard antivirus application in all provided versions of Windows Servers for external customers in STACKIT.

To keep the virus pattern definitions up to date, the task “Windows_Defender_Auto_Update” is created in the task scheduler at the initial configuration step of an ordered Windows Server:

Windows Defender Auto Update task properties dialog box, showing the General tab and security options set to run as SYSTEM with highest privileges.

This scheduled task is already triggered by the system when the server is accessed the first time and repeats every 6 hours:

Edit Trigger dialog box showing the task schedule set to 'One time' with a repeat interval of '6 hours' for an indefinite duration.

When the task gets executed, the pattern will update itself via the native powershell cmdlet “Update-MpSignature” provided by Windows:

Edit Action dialog box showing the task set to 'Start a program', running 'powershell.exe' with the argument 'Update-MpSignature'.

Additional security fixes provided in the images

Section titled “Additional security fixes provided in the images”

For the following known vulnerabilities we provide a solution that is implemented in all images:

NameAvailable in image since
SSL Medium Strength Cipher Suites Supported (SWEET32)08.09.2022
SSL RC4 Cipher Suites Supported (Bar Mitzvah)08.09.2022
Windows Speculative Execution Configuration Check08.09.2022
Windows PrintNightmare Registry Exposure CVE-2021-34527 OOB Security Update RCE (July 2021)08.09.2022