Skip to content

Commit

Permalink
Defaults+Main Typo fixes1
Browse files Browse the repository at this point in the history
Signed-off-by: Frederick Witty <[email protected]>
  • Loading branch information
frederickw082922 committed Aug 22, 2023
1 parent 5995ac3 commit d440954
Showing 1 changed file with 13 additions and 13 deletions.
26 changes: 13 additions & 13 deletions defaults/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ win2022stig_cat3_patch: true
win2022stig_min_ansible_version: "2.10.1"

# We've defined complexity-high as cannot automatically remediate
# the rule in question. In the future this might mean that the remediation
# the rule in question. In the future, this might mean that the remediation
# may fail in some cases.
win2022stig_complexity_high: false

Expand All @@ -29,13 +29,13 @@ win2022stig_audit_disruptive: true
# tweak role to run in a non-privileged container
win2022stig_system_is_container: false

# This parameter disables controls that could have a very lengthy find. For example
# This parameter disables controls that could have a very lengthy find. For example,
# removing all files of a specific file type that search the entire drive.
# If there is an action tied to the lengthy search the action task will be disabled as well.
# WN22-00-000240 - CAT2
win22stig_lengthy_search: false

# win22stig_cloud_based_system is a setting built into the playbook for testing locally vs azure.
# win22stig_cloud_based_system is a setting built into the playbook for testing locally vs Azure.
# We have found certain controls need to be set in a different order when being applied in the
# different environments. By Default This is set to false.
win22stig_cloud_based_system: false
Expand Down Expand Up @@ -354,12 +354,12 @@ wn22stig_lockoutbadcount: 3

# WN22-AC-000030
# Windows Server 2022 must have the period of time before the bad logon counter is reset configured to 15 minutes or greater.
# wn22stig_resetlockoutcount is the Reset account lockout counter after value in mintues.
# wn22stig_resetlockoutcount is the Reset account lockout counter after value in minutes.
wn22stig_resetlockoutcount: 15

# WN22-AC-000040
# Windows Server 2022 password history must be configured to 24 passwords remembered.
# wn22stig_passwordhistorysize is the number of passwords windows will remember before you may
# wn22stig_passwordhistorysize is the number of passwords Windows will remember before you may
# be able to reuse that same password. The default value is "24" for Windows domain systems.
# DoD determined appropriate the value for all Windows systems.
wn22stig_passwordhistorysize: 24
Expand All @@ -382,7 +382,7 @@ wn22stig_minimumpasswordlength: 14
# WN22-CC-000110
# Windows Server 2022 virtualization-based security must be enabled with the platform security
# level configured to Secure Boot or Secure Boot with DMA Protection.
# wn22stig_dma_protection is the level that they would like to setup.
# wn22stig_dma_protection is the level that they would like to set up.
# Valid settings are as follows.
# 1 (Secure Boot only)
# 3 (Secure Boot and DMA Protection)
Expand All @@ -396,7 +396,7 @@ wn22stig_dma_protection: 3
# Approved values are below:
# 8 - Good only
# 1 - Good and unknown
# 3 - Good, unknown and bad but critical
# 3 - Good, unknown, and bad but critical
wn22stig_driver_load_policy: 1

# WN22-CC-000270
Expand Down Expand Up @@ -427,7 +427,7 @@ wn22stig_senetworklogonright_dc: Administrators,Authenticated Users,Enterprise D
# WN22-DC-000430
# The password for the krbtgt account on a domain must be reset at least every 180 days.
# The default setting here matches the STIG requirements. If you would like to
# enforce a more strcit policy you may do so for auditing purposes.
# enforce a more strict policy you may do so for auditing purposes.
# NOTE: Valid Days are 180 or less.
wn22stig_krbtgt_account_pass_age: 180

Expand All @@ -443,7 +443,7 @@ wn22stig_senetworklogonright: Administrators,Authenticated Users

# WN22-SO-000030
# Windows Server 2022 built-in administrator account must be renamed.
# wn22stig_newadministratorname is the non-default name for the Administror Account.
# wn22stig_newadministratorname is the non-default name for the Administrator Account.
wn22stig_newadministratorname: adminchangethis

# WN22-SO-000040
Expand All @@ -454,15 +454,15 @@ wn22stig_newguestname: guestchangethis
# WN22-SO-000100
# The maximum age for machine account passwords must be configured to 30 days or less.
# wn22stig_machineaccountpsswd_max_age is the setting for the Computer account passwords
# are changed automatically on a regular basis. This setting controls the maximum password
# that are changed automatically on a regular basis. This setting controls the maximum password
# age that a machine account may have. This must be set to no more than 30 days, ensuring
# the machine changes its password monthly.
wn22stig_machineaccountpsswd_max_age: 30

# WN22-SO-000120
# The machine inactivity limit must be set to 15 minutes, locking the system with the screen saver.
# wn22stig_inactivitytimeoutsecs is the time in seconds that will be set in the registry that
# enagages the screen saver. Default setting is "900" seconds or less excluding "0"
# enagages the screen saver. The default setting is "900" seconds or less excluding "0"
wn22stig_inactivitytimeoutsecs: 900

# WN22-SO-000130
Expand Down Expand Up @@ -500,7 +500,7 @@ wn22stig_sys_maxsize: 32768

# WN22-SO-000400
# User Account Control must, at a minimum, prompt administrators for consent on the secure desktop.
# The more secure option for this setting, "Prompt for credenti
# The more secure option for this setting, "Prompt for credentials on the secure desktop"
# Default setting is 2
# 2 -(Prompt for consent on the secure desktop)
# 1 -(Prompt for credentials on the secure desktop)
Expand All @@ -521,7 +521,7 @@ wn22stig_krbtgt_pass_age: 180
wn22stig_seinteractivelogonright: Administrators

# WN22-UR-000040
# The Back up files and directories user right must only be assigned to the Administrators group.
# The Backup files and directories user right must only be assigned to the Administrators group.
# If any SIDs other than the following are granted the "SeBackupPrivilege" user right, this is a finding.
# If an application requires this user right, this would not be a finding. Vendor documentation must support the
# requirement for having the user right. The requirement must be documented with the ISSO.
Expand Down

0 comments on commit d440954

Please sign in to comment.