CIS Windows 2000 Professional Level2 Benchmark v2.2.1 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Prose - CIS Windows 2000 Professional Level2 Benchmark v2.2.1
- Center for Internet Security (CIS)
Target:
Target | CPE Name |
---|---|
Microsoft Windows 2000 Professional | cpe:/o:microsoft:windows_2000:::professional (View CVEs) |
Checklist Highlights
- Checklist Name:
- CIS Windows 2000 Professional Level2 Benchmark
- Checklist ID:
- 70
- Version:
- v2.2.1
- Type:
- Compliance
- Review Status:
- Archived
- Authority:
- Third Party: Center for Internet Security (CIS)
- Original Publication Date:
- 11/15/2004
Checklist Summary:
This document is a security benchmark for the Microsoft Windows 2000 Professional operating system for workstations. It reflects the content of the Consensus Baseline Security Settings document developed by the National Security Agency (NSA), the Defense Information Systems Agency (DISA), The National Institute of Standards and Technology (NIST), the General Services Administration (GSA), The SANS Institute, and the staff and members of the Center for Internet Security (CIS). Section 1 of this guide is a summary checklist of the configuration settings that constitute a Windows 2000 Professional compliant computer system. Appendix A is a questionnaire that can be used to put the trade-offs into perspective for each of the settings involved. Section 2 of this guide is written to provide contextual descriptions of each requirement for this benchmark. It gives plain-text details of what the setting means, why it is restricted, and what the consequences of restricting that setting may be. It covers the same information as Section 1 in greater detail.
Checklist Role:
- Desktop Operating System
Known Issues:
This guide provides CIS Level-2 benchmarks, which provide prudent security beyond the minimum level. The settings should be applied only to Windows 2000 workstation and server operating systems. The guide contains some security configuration recommendations that affect operating system function, and are therefore of greatest value to system administrators who have sufficient security knowledge to apply them with consideration to OS functions and software applications running in their particular environments. Appendix D contains a list of known problematic settings.
Target Audience:
Not provided.
Target Operational Environment:
- Managed
Testing Information:
Not provided.
Regulatory Compliance:
Not provided.
Comments/Warnings/Miscellaneous:
Refer to Known Issues.
Disclaimer:
Proper use of the recommendations requires careful analysis and adaptation to specific user requirements. The recommendations are not in any way intended to be a quick fix for anyones information security needs. CIS makes no representations, warranties or covenants whatsoever as to (i) the positive or negative effect of the products or the recommendations on the operation or the security of any particular network, computer system, network device, software, hardware, or any component of any of the foregoing or (ii) the accuracy, reliability, timeliness or completeness of any product or recommendation. CIS is providing the products and the recommendations as is and as available without representations, warranties or covenants of any kind.
Product Support:
Not provided.
Point of Contact:
windows-feedback@cisecurity.org
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Updated URL - 7/26/19 Archived per CIS - 12/20/19
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|