Skip to main content
CUI

Vulnerability V-268319

Back

V-268319

CAT II

Windows 10 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.

Ships Affected
1
Total Findings
4
Open
0
Closed
2

Check Text

Verify the Windows 10 system is receiving policy from either Group Policy or an MDM with the following steps: From a command line or PowerShell: gpresult /R OS Configuration: Member Workstation If the system is not being managed by GPO, ask the administrator to indicate which MDM is managing the device. From PowerShell: Get-Service -Name "IntuneManagementExtension" If the Windows 10 system is not receiving policy from either Group Policy or an MDM, this is a finding. This is NA for standalone, nondomain-joined systems.

Fix Text

Configure the Windows 10 system to use either Group Policy or an approved MDM product to enforce STIG compliance.

STIG Reference

STIG
Microsoft Windows 10 Security Technical Implementation Guide
Version
3
Release
6
Rule ID
SV-268319r1135263_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 MONT-SW-89134_Win10_V3R5_20251217-201218.ckl
Unassigned 2026-03-04T15:25:42.339596 View in Context
USNS MONTFORD POINT T-ESD-1 MONT-SW-89108_Win10_V3R5_20251217-203019.ckl
Unassigned 2026-03-04T15:25:16.342077 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Win10_V3R4_20251023-141133.ckl
Unassigned 2026-01-14T12:57:28.689048 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Win10_V3R4_20251023-142421.ckl
Unassigned 2026-01-14T12:57:26.690022 View in Context
CUI