V-243480
CAT IIThe domain functional level must be at a Windows Server version still supported by Microsoft.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 0
- Closed
- 1
Check Text
Open "Active Directory Domains and Trusts" (run "domain.msc") or "Active Directory Users and Computers" (run "dsa.msc").
Right-click in the left pane on the name of the Domain being reviewed.
Select "Raise domain functional level..."
The current domain functional level will be displayed (as well as the option to raise the domain functional level).
Select "Cancel" to exit.
Alternately, using PowerShell (Windows Server 2016):
Select "Active Directory Module for Windows PowerShell", available in Administrative Tools or the Start Screen.
Run "Get-ADDomain".
View the value for "DomainMode:"
If the domain functional level is not Windows Server 2016, this is a finding.
Using the highest domain functional level supported by the domain controllers is recommended.
Fix Text
Raise the domain functional level to Windows Server 2016. Using the highest domain functional level supported by the domain controllers is recommended.
Raising the domain functional level needs to be carefully planned and implemented. This prevents the addition of domain controllers to the domain using Windows versions prior to the current domain functional level.
Refer to Microsoft documentation for the process and requirements of raising the domain functional level.
STIG Reference
- STIG
- Active Directory Domain Security Technical Implementation Guide
- Version
- 3
- Release
- 7
- Rule ID
- SV-243480r959010_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_ADDomain_V3R5_20251023-171837.ckl | Unassigned | 2026-01-14T12:57:36.435963 | View in Context |