U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Microsoft Windows 2012 and 2012 R2 STIG Ver 3, Rel 6 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Microsoft Windows Server 2012 cpe:/o:microsoft:windows_server_2012:- (View CVEs)
Microsoft Windows Server 2012 R2 cpe:/o:microsoft:windows_server_2012:r2 (View CVEs)

Checklist Highlights

Checklist Name:
Microsoft Windows 2012 and 2012 R2 STIG
Checklist ID:
560
Version:
Ver 3, Rel 6
Type:
Compliance
Review Status:
Final
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
04/28/2017

Checklist Summary:

The Windows Server 2012 / 2012 R2 Member Server Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus as well as Windows security guidance by Microsoft Corporation. This document is meant for use in conjunction with other applicable STIGs, including such topics as, Web Servers, Domain Name Service (DNS), and Database. Microsoft released Windows Server 2012 R2 as an update to Windows Server 2012, instead of a Service Pack as with previous Windows versions. Windows Server 2012 R2 changed some functionality as well as adding new functionality. Unless otherwise noted, the requirements in this STIG apply to both Windows Server 2012 and 2012 R2. Requirements that are applicable to a specific version are noted as such. The Windows Server 2012 / 2012 R2 Domain Controller Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus as well as Windows security guidance by Microsoft Corporation. This document is meant for use in conjunction with other applicable STIGs, including such topics as, Active Directory Domain, Active Directory Forest, and Domain Name Service (DNS). Microsoft released Windows Server 2012 R2 as an update to Windows Server 2012, instead of a Service Pack as with previous Windows versions. Windows Server 2012 R2 changed some functionality as well as adding new functionality. Unless otherwise noted, the requirements in this STIG apply to both Windows Server 2012 and 2012 R2. Requirements that are applicable to a specific version are noted as such.

Checklist Role:

  • Operating System

Known Issues:

No known issues

Target Audience:

Parties within the DoD and Federal Government’s computing environments can obtain the applicable STIG from the Cyber Exchange website at https://cyber.mil/. This site contains the latest copies of STIGs, SRGs, and other related security information. Those without a Common Access Card (CAC) that has DoD Certificates can obtain the STIG from https://public.cyber.mil/.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not Provided

Regulatory Compliance:

DoD Instruction (DoDI) 8500.01

Comments/Warnings/Miscellaneous:

Not Provided

Disclaimer:

Not Provided

Product Support:

Parties within the DoD and Federal Government’s computing environments can obtain the applicable STIG from the Cyber Exchange website at https://cyber.mil/. This site contains the latest copies of STIGs, SRGs, and other related security information. Those without a Common Access Card (CAC) that has DoD Certificates can obtain the STIG from https://public.cyber.mil/.

Point of Contact:

[email protected]

Sponsor:

Not Provided

Licensing:

Not Provided

Change History:



					

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 02/13/2026