U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Microsoft Windows Vista STIG Version 6 Release 42 Checklist Details (Checklist Revisions)

SCAP 1.1 Content:

Supporting Resources:

Target:

Target CPE Name
Microsoft Internet Explorer cpe:/a:microsoft:ie (View CVEs)
Microsoft Windows Vista cpe:/o:microsoft:windows_vista (View CVEs)

Checklist Highlights

Checklist Name:
Microsoft Windows Vista STIG
Checklist ID:
338
Version:
Version 6 Release 42
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
10/28/2016

Checklist Summary:

This document is designed to instruct the reviewer on how to assess Windows Vista configurations in a Windows domain. In addition, the security settings recommended can also be used to configure Group Policy in a Windows Active Directory environment.

Checklist Role:

  • Operating System

Known Issues:

Not provided.

Target Audience:

DISA Field Security Operations- Sites are required to secure the Microsoft Windows Vista operating system in accordance with DoD Directive 8500.1, Section 4.18 (and related footnote). The checks in this document were developed from DISA and NSA guidelines specified in the above reference, as well as the Windows Server 2003/XP/Vista security guides and security templates published by the Microsoft Corporation.

Target Operational Environment:

  • Managed

Testing Information:

Not provided.

Regulatory Compliance:

Not provided.

Comments/Warnings/Miscellaneous:

The settings in this checklist are directed towards securing a native Windows environment (i.e. Windows 2000 or later OSs). If the environment is a mixed one, with down-level OSs, or maintains trusts with down-level OSs, then the following checks should be reviewed. Configuring them to the required setting could cause compatibility problems.

Disclaimer:

Not provided.

Product Support:

Not provided.

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

Changed status from "Under Review" to "Final" - 03 June 2015
Version 6, Release 1.36 - 25 July 2014
Version 6, Release 1.35 - 24 April 2014
Version 6, Release 1.34 - 13 March 2014
Version 6, Release 1.33 - 24 January 2014
Version 6, Release 1.32 - 23 December 2013
Version 6, Release 1.30 - 23 July 2013
Version 6, Release 1.29 - 23 July 2013
Version 6, Release 1.29 - 1 April 2013
Version 6, Release 1.28 - 1 April 2013
Version 6, Release 1.27 - date unknown
Version 6, Release 1.26 - 27 July 2012
Version 6, Release 1.25 - 27 April 2012
Updated "Point of Contact" - 07 January 2015
Version 6, Release 1.37 Benchmark - 28 January 2015
Version 6, Release 1.35 - 28 January 2015
Version 6, Release 38 - 29 October 2015
Version 6, Release 41 Benchmark - 29 October 2015
Changed status from "Under Review" to "Final" - 29 December 2015
Changed status from "Under Review" to "Final" - 15 February 2016
5/2/2016 - Version 6, Release 39
moved to FINAL - 6/7/2016
updated to - v6, r40 - 07/22/2016
Updated to FINAL - 09/12/2016
Updated STIG to Version 6 Release 41 - 10/28/2016
updated to FINAL - 12/07/2016
Updated URL to reflect change to the DISA website - http --> https
moved to archive status - 4/15/19

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 04/15/2019