Skip to content
This repository has been archived by the owner on Jun 3, 2021. It is now read-only.

Latest commit

 

History

History

Compliance

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

BitLocker Compliance

The BitLocker audit file can be used to verify implementation of the BitLocker settings. The Nessus audit file provides an automated way of verifying as many checks as possible. DoD components can acquire Nessus via the ACAS program.

Running Compliance Checks

There are two ways you can check compliance with the provided audit files:

  1. Use Nessus
  2. Use the provided Compliance PowerShell script (Nessus not required)

Domain Scan with Nessus

  1. Download the above .audit files
  2. For each audit file make a new Policy Compliance Auditing scan
  3. Configure the correct set of machines to scan and provide the correct credentials for the scan
  4. On the Compliance tab, select Windows and then select Upload a custom Windows audit file
  5. Run the scan and review the results

A paid version of Nessus Professional or Nessus Manager must be used in order to use .audit files with Nessus. The .audit files have been tested and work on Nessus Professional version 7.0. They may work on older versions as well but they have not been tested. Alternatively, you can use the provided PowerShell script to locally scan a single system.

Standalone Scan with PowerShell

The Test-Compliance command in the Compliance PowerShell module can be used to verify compliance against using any of the above listed .audit files. This PowerShell script makes it simple to scan a single standalone system and verify a configuration has been applied to a system in a non-domain context. Note that Nessus is not required to be installed on the system that is being checked with the script. The following instructions can be used to execute a compliance check locally.

  1. Open a PowerShell prompt as an administrator
  2. Change directory to the Compliance\Scripts directory (e.g. cd BitLocker-Guidance\Compliance\Scripts)
  3. Import the Compliance PowerShell module to load the code into the PowerShell session: Import-Module -Name .\Secure-Host-Baseline\Compliance\Scripts\Compliance.psm1
  4. Test-Compliance -Path '.\BitLocker Guidance\Compliance\BitLocker.audit' and press Enter twice

The Compliance script supports a -Verbose option that show details for checks that fail. Without the verbose option a simple pass/fail is displayed for each compliance check as shown in the image below.

Verbose example:

Test-Compliance -Path '..\..\BitLocker\Compliance\BitLocker.audit' -Verbose

Verbose example with capturing the output into a file:

Test-Compliance -Path '..\..\BitLocker\Compliance\BitLocker.audit' -Verbose .\*>BitLockerComplianceReport.txt

After capturing the output into a file, the failed checks can be filtered using this PowerShell command:

Select-String -Path .\BitLockerComplianceReport.txt -Pattern 'FAILED'

Links