Active Directory Domain STIG Ver 2, Rel 13 Checklist Details (Checklist Revisions)
The Active Directory (AD) Domain Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The AD Domain STIG provides further guidance for secure configuration of Microsoft's AD implementation.
The importance of AD to an organization is linked inherently to the importance of the Windows servers used by that organization. This is obvious once it is understood that AD is virtually inseparable from a current Windows implementation for more than a few users. AD provides a distributed repository for identification and authentication data. As such, AD is critical to enabling and securing shared resources such as, files, printers, websites and database servers that involve information above the public confidentiality level.
This document is meant for use in conjunction with other applicable STIGs including such topics as, Active Directory Forest, Windows Domain Controllers, and Domain Name Service (DNS).
- Specialized Security-Limited Functionality (SSLF)
DOD Directive 8500.
It should be noted that FSO Support for the STIGs, Checklists, and Tools is only available to DOD Customers.
moved to FINAL - 6/7/2016
Updated to v2, r8 - 01/27/2017
Updated to FINAL - 03/08/2017
Updated URL to reflect change to the DISA website - http --> https
Updated version to v2, r9 - 3/21/2018
updated to FINAL - 4/24/18
updated to Ver 2, Rel 10- 7/24/18
Updated to FINAL - 8/24/18
Updated to Ver 2, Rel 11- 10/25/18
Corrected Resource link - 10/31/18
Updated to FINAL - 12/3/18
updated to Ver 2, Rel 12- 1/23/19
Updated to FINAL - 2/19/19
Status Updated to FINAL - 3/19/19
updated to Ver 2, Rel 13- 4/30/19
Updated URLs - 6/4/19
NIST checklist record last modified on 06/04/2019