The Windows Server 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed by DoD Consensus as well as Windows security guidance by Microsoft Corporation. This document is meant for use in conjunction with other applicable STIGs including such topics as Active Directory Domain, Active Directory Forest, and Domain Name Service (DNS).
The Windows Server 2016 STIG includes requirements for both domain controllers and member servers/standalone systems. Requirements specific to domain controllers have “DC” as the second component of the STIG IDs. Requirements specific to member servers have “MS” as the second component of the STIG IDs. All other requirements apply to all systems.
- Desktop and Server Operating System
This checklist is primarily for IT generalists, security specialists, network architects, and other IT professionals and consultants who plan application or infrastructure development and deployments of Windows 8 and BitLocker for both desktop and laptop client computers in an enterprise environment.
- Specialized Security-Limited Functionality (SSLF)
DoD Instruction (DoDI) 8500.01
Updated to FINAL - 03/13/2017
Updated URL to reflect change to the DISA website - http --> https
Updated - 11/01/2017
Updated to FINAL - 12/02/2017
corrected resource title - 1/24/2018
Updated to Version 1, Release 3 - 02/16/2018
Updated to FINAL - 3/18/2018
updated to v1,r4 - 4/25/18
Updated to FINAL - 5/27/18
updated to Version 1, Release 5 - 7/24/18
Added GPOs - 8/6/18
Updated to FINAL - 9/6/2018
Updated to Version 1, Release 6 - 10/25/18
NIST checklist record last modified on 10/25/2018