V-220835
CAT IIIWindows Update must not obtain updates from other PCs on the internet.
- Ships Affected
- 1
- Total Findings
- 4
- Open
- 0
- Closed
- 4
Check Text
If the following registry value does not exist or is not configured as specified, this is a finding.
Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization\
Value Name: DODownloadMode
Value Type: REG_DWORD
Value: 0x00000000 (0) - No peering (HTTP Only)
0x00000001 (1) - Peers on same NAT only (LAN)
0x00000002 (2) - Local Network / Private group peering (Group)
0x00000063 (99) - Simple download mode, no peering (Simple)
0x00000064 (100) - Bypass mode, Delivery Optimization not used (Bypass)
A value of 0x00000003 (3), Internet, is a finding.
v1507 LTSB:
Domain joined systems:
Verify the registry value above.
If the value is not 0x00000000 (0) or 0x00000001 (1), this is a finding.
Standalone or nondomain-joined systems (configured in Settings):
If the following registry value does not exist or is not configured as specified, this is a finding:
Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\
Value Name: DODownloadMode
Value Type: REG_DWORD
Value: 0x00000000 (0) - Off
0x00000001 (1) - LAN
Fix Text
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Delivery Optimization >> "Download Mode" to "Enabled" with any option except "Internet" selected.
Acceptable selections include:
Bypass (100)
Group (2)
HTTP only (0)
LAN (1)
Simple (99)
v1507 (LTSB) does not include this group policy setting locally. For domain-joined systems, configure through domain group policy as "HTTP only (0)" or "Lan (1)".
For standalone or nondomain-joined systems, configure using Settings >> Update & Security >> Windows Update >> Advanced Options >> "Choose how updates are delivered" with either "Off" or "PCs on my local network" selected.
STIG Reference
- STIG
- Microsoft Windows 10 Security Technical Implementation Guide
- Version
- 3
- Release
- 6
- Rule ID
- SV-220835r991589_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | MONT-SW-89134_Win10_V3R5_20251217-201218.ckl | Unassigned | 2026-03-04T15:25:42.339596 | View in Context | |
| USNS MONTFORD POINT | T-ESD-1 | MONT-SW-89108_Win10_V3R5_20251217-203019.ckl | Unassigned | 2026-03-04T15:25:16.342077 | View in Context | |
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Win10_V3R4_20251023-141133.ckl | Unassigned | 2026-01-14T12:57:28.689048 | View in Context | |
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Win10_V3R4_20251023-142421.ckl | Unassigned | 2026-01-14T12:57:26.690022 | View in Context |