U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CIS Windows 2000 Professional Level2 Benchmark v2.2.1 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Microsoft Windows 2000 Professional cpe:/o:microsoft:windows_2000:::professional (View CVEs)

Checklist Highlights

Checklist Name:
CIS Windows 2000 Professional Level2 Benchmark
Checklist ID:
70
Version:
v2.2.1
Type:
Compliance
Review Status:
Archived
Authority:
Third Party: Center for Internet Security (CIS)
Original Publication Date:
11/15/2004

Checklist Summary:

This document is a security benchmark for the Microsoft Windows 2000 Professional operating system for workstations. It reflects the content of the Consensus Baseline Security Settings document developed by the National Security Agency (NSA), the Defense Information Systems Agency (DISA), The National Institute of Standards and Technology (NIST), the General Services Administration (GSA), The SANS Institute, and the staff and members of the Center for Internet Security (CIS). Section 1 of this guide is a summary checklist of the configuration settings that constitute a Windows 2000 Professional compliant computer system. Appendix A is a questionnaire that can be used to put the trade-offs into perspective for each of the settings involved. Section 2 of this guide is written to provide contextual descriptions of each requirement for this benchmark. It gives plain-text details of what the setting means, why it is restricted, and what the consequences of restricting that setting may be. It covers the same information as Section 1 in greater detail.

Checklist Role:

  • Desktop Operating System

Known Issues:

This guide provides CIS Level-2 benchmarks, which provide prudent security beyond the minimum level. The settings should be applied only to Windows 2000 workstation and server operating systems. The guide contains some security configuration recommendations that affect operating system function, and are therefore of greatest value to system administrators who have sufficient security knowledge to apply them with consideration to OS functions and software applications running in their particular environments. Appendix D contains a list of known problematic settings.

Target Audience:

Not provided.

Target Operational Environment:

  • Managed

Testing Information:

Not provided.

Regulatory Compliance:

Not provided.

Comments/Warnings/Miscellaneous:

Refer to Known Issues.

Disclaimer:

Proper use of the recommendations requires careful analysis and adaptation to specific user requirements. The recommendations are not in any way intended to be a quick fix for anyones information security needs. CIS makes no representations, warranties or covenants whatsoever as to (i) the positive or negative effect of the products or the recommendations on the operation or the security of any particular network, computer system, network device, software, hardware, or any component of any of the foregoing or (ii) the accuracy, reliability, timeliness or completeness of any product or recommendation. CIS is providing the products and the recommendations as is and as available without representations, warranties or covenants of any kind.

Product Support:

Not provided.

Point of Contact:

windows-feedback@cisecurity.org

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

Updated URL - 7/26/19
Archived per CIS - 12/20/19

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 12/20/2019