V-268319
CAT IIWindows 10 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.
- Ships Affected
- 1
- Total Findings
- 4
- Open
- 0
- Closed
- 2
Check Text
Verify the Windows 10 system is receiving policy from either Group Policy or an MDM with the following steps:
From a command line or PowerShell:
gpresult /R
OS Configuration: Member Workstation
If the system is not being managed by GPO, ask the administrator to indicate which MDM is managing the device.
From PowerShell: Get-Service -Name "IntuneManagementExtension"
If the Windows 10 system is not receiving policy from either Group Policy or an MDM, this is a finding.
This is NA for standalone, nondomain-joined systems.
Fix Text
Configure the Windows 10 system to use either Group Policy or an approved MDM product to enforce STIG compliance.
STIG Reference
- STIG
- Microsoft Windows 10 Security Technical Implementation Guide
- Version
- 3
- Release
- 6
- Rule ID
- SV-268319r1135263_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | MONT-SW-89134_Win10_V3R5_20251217-201218.ckl | Unassigned | 2026-03-04T15:25:42.339596 | View in Context | |
| USNS MONTFORD POINT | T-ESD-1 | MONT-SW-89108_Win10_V3R5_20251217-203019.ckl | Unassigned | 2026-03-04T15:25:16.342077 | View in Context | |
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Win10_V3R4_20251023-141133.ckl | Unassigned | 2026-01-14T12:57:28.689048 | View in Context | |
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Win10_V3R4_20251023-142421.ckl | Unassigned | 2026-01-14T12:57:26.690022 | View in Context |