Target | CPE Name |
---|---|
Microsoft Active Directory | cpe:/a:microsoft:active_directory (View CVEs) |
The Active Directory (AD) Domain Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The AD Domain STIG provides further guidance for secure configuration of Microsoft's AD implementation. The importance of AD to an organization is linked inherently to the importance of the Windows servers used by that organization. This is obvious once it is understood that AD is virtually inseparable from a current Windows implementation for more than a few users. AD provides a distributed repository for identification and authentication data. As such, AD is critical to enabling and securing shared resources such as, files, printers, websites and database servers that involve information above the public confidentiality level. This document is meant for use in conjunction with other applicable STIGs including such topics as, Active Directory Forest, Windows Domain Controllers, and Domain Name Service (DNS).
Not Provided
Not Provided
Not Provided
DOD Directive 8500.
Not Provided
Not Provided
It should be noted that FSO Support for the STIGs, Checklists, and Tools is only available to DOD Customers.
disa.stig_spt@mail.mil
Not Provided
Not Provided
moved to FINAL - 6/7/2016 Updated to v2, r8 - 01/27/2017 Updated to FINAL - 03/08/2017 Updated URL to reflect change to the DISA website - http --> https Updated version to v2, r9 - 3/21/2018 updated to FINAL - 4/24/18 updated to Ver 2, Rel 10- 7/24/18 Updated to FINAL - 8/24/18 Updated to Ver 2, Rel 11- 10/25/18 Corrected Resource link - 10/31/18 Updated to FINAL - 12/3/18 updated to Ver 2, Rel 12- 1/23/19 Updated to FINAL - 2/19/19 Status Updated to FINAL - 3/19/19 updated to Ver 2, Rel 13- 4/30/19 Updated URLs - 6/4/19 Updated resource per DISA - 11/24/21
URL | Description |
---|
Reference URL | Description |
---|