This repository has been archived by the owner on Jun 3, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 36
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
a7bc2cc
commit 4d24e45
Showing
2 changed files
with
126 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,3 @@ | ||
Policy Path,Policy Name,Policy State,Policy Value,Registry Path,Registry Value Name,Registry Data Value,Applicable Client,Applicable Server,Required for Applicable OS | ||
Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives,Allow enhanced PINs for startup,Enabled, ,HKLM\Software\Policies\Microsoft\FVE,UseEnhancedPin,1,Windows 7+,Windows Server 2008 R2+,Yes | ||
Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives,Configure minimim PIN length for startup,Enabled,6 *or* larger value,HKLM\Software\Policies\Microsoft\FVE,MinimumPIN,6 *or* larger,Windows 7+,Windows Server 2008 R2+,Yes | ||
Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives,Configure minimum PIN length for startup,Enabled,6 *or* larger value,HKLM\Software\Policies\Microsoft\FVE,MinimumPIN,6 *or* larger,Windows 7+,Windows Server 2008 R2+,Yes |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,129 @@ | ||
<check_type: "Windows" version: "2"> | ||
<group_policy: "Verifies Spectre and Meltdown patches are installed and mitigations are enabled for browsers on Windows operating systems"> | ||
<group_policy: "Verifies BitLocker settings"> | ||
|
||
# Check for prerequisite that PowerShell must be installed | ||
|
||
<custom_item> | ||
type: FILE_CHECK | ||
description: "Detects if powershell.exe exists." | ||
info: "Detects if powershell.exe exists. PowerShell is required for other Nessus checks in this custom audit file as well as required for verifying Spectre and Meltdown operating system and firmware mitigations. | ||
|
||
Looks for: | ||
%SystemRoot%\System32\WindowsPowerShell\v1.0\powershell.exe | ||
" | ||
value_type: POLICY_TEXT | ||
value_data: "%SystemRoot%\System32\WindowsPowerShell\v1.0\powershell.exe" | ||
check_type: CHECK_EQUAL | ||
file_option: MUST_EXIST | ||
severity: HIGH | ||
</custom_item> | ||
|
||
# Check for prerequisite that PowerShell version 2.0 or later must be installed | ||
|
||
<custom_item> | ||
type: AUDIT_POWERSHELL | ||
description: "Detects if PowerShell 2.0 or later is installed." | ||
info: " | ||
Detects if PowerShell 2.0 or later is installed. | ||
|
||
Executes PowerShell code: | ||
|
||
([System.Version]($PSVersionTable).PSVersion.ToString().SubString(0,3)).CompareTo([System.Version]'2.0') -ge 0 | ||
" | ||
value_type: POLICY_TEXT | ||
value_data: "True" | ||
check_type: CHECK_EQUAL | ||
powershell_args: "([System.Version]($PSVersionTable).PSVersion.ToString().SubString(0,3)).CompareTo([System.Version]'2.0') -ge 0" | ||
ps_encoded_args: NO | ||
only_show_cmd_output: NO | ||
severity: HIGH | ||
</custom_item> | ||
|
||
# Check that BitLocker is not enabled yet | ||
|
||
<if> | ||
<condition type: "and"> | ||
<custom_item> | ||
type: AUDIT_POWERSHELL | ||
description: "Detects if BitLocker is enabled by using PowerShell" | ||
info: " | ||
The January 2018 patches must be installed for the SpeculationControl module to correctly detect the system configuration. | ||
|
||
If this check fails, the check the following: | ||
1. ensure the SpeculationControl module is installed | ||
2. ensure the January 2018 Windows operating system patches are installed | ||
3. ensure a firmware update has been installed | ||
|
||
Executes PowerShell code: | ||
|
||
$bitlocker = Get-WMIObject -Class 'Win32_EncryptableVolume' -Namespace 'root/CIMV2/Security/MicrosoftVolumeEncryption' -Filter "DriveLetter='$env:SystemDrive'"; $bitlocker.ProtectionStatus -eq 0 | ||
" | ||
value_type: POLICY_TEXT | ||
value_data: "True" | ||
check_type: CHECK_EQUAL | ||
powershell_args: "$bitlocker = Get-WMIObject -Class 'Win32_EncryptableVolume' -Namespace 'root/CIMV2/Security/MicrosoftVolumeEncryption' -Filter "\"DriveLetter='$env:SystemDrive'\""; $bitlocker.ProtectionStatus -eq 0" | ||
ps_encoded_args: NO | ||
only_show_cmd_output: NO | ||
severity: HIGH | ||
</custom_item> | ||
</condition> | ||
<then> | ||
|
||
<custom_item> | ||
type: REGISTRY_SETTING | ||
description: "Detects if allowing standby state when on battery is disabled." | ||
info: " | ||
Detects if allowing standby state when on battery is disabled. The registry value data must be set to 0 for standby state when on battery to be disabled. | ||
|
||
Key: HKLM\Software\Policies\Microsoft\Power\PowerSettings\abfc2519-3608-4c2a-94ea-171b0ed546ab | ||
Value Name: DCSettingIndex | ||
Value Data: 0 | ||
Value Type: DWORD | ||
|
||
Computer Configuration > System > Power Management > Sleep Settings | ||
Allow standby states (S1-S3) when sleeping (on battery) | ||
Disabled | ||
" | ||
value_type: POLICY_DWORD | ||
value_data: 0 | ||
reg_key: "HKLM\Software\Policies\Microsoft\Power\PowerSettings\abfc2519-3608-4c2a-94ea-171b0ed546ab" | ||
reg_item: "DCSettingIndex" | ||
reg_option: CAN_NOT_BE_NULL | ||
severity: HIGH | ||
</custom_item> | ||
|
||
<custom_item> | ||
type: REGISTRY_SETTING | ||
description: "Detects if allowing standby state when plugged in is disabled." | ||
info: " | ||
Detects if allowing standby state when plugged in is disabled. The registry value data must be set to 0 for standby state when plugged in to be disabled. | ||
|
||
Key: HKLM\Software\Policies\Microsoft\Power\PowerSettings\abfc2519-3608-4c2a-94ea-171b0ed546ab | ||
Value Name: ACSettingIndex | ||
Value Data: 0 | ||
Value Type: DWORD | ||
|
||
Computer Configuration > System > Power Management > Sleep Settings | ||
Allow standby states (S1-S3) when sleeping (plugged in) | ||
Disabled | ||
" | ||
value_type: POLICY_DWORD | ||
value_data: 0 | ||
reg_key: "HKLM\Software\Policies\Microsoft\Power\PowerSettings\abfc2519-3608-4c2a-94ea-171b0ed546ab" | ||
reg_item: "DCSettingIndex" | ||
reg_option: CAN_NOT_BE_NULL | ||
severity: HIGH | ||
</custom_item> | ||
|
||
</then> | ||
<else> | ||
<report type: "PASSED"> | ||
description: "BitLocker not enabled." | ||
info: "BitLocker not enabled | ||
" | ||
</report> | ||
</else> | ||
</if> | ||
|
||
</group_policy> | ||
</check_type> |