|
<Past |
Future> |
| 2000 (all versions) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
| 2003 SP2 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
| 2003 R2 SP2 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
| 2008 SP2 |
DIVEST [9, 10] |
DIVEST [9, 10] |
DIVEST [9, 10, 11] |
DIVEST [10, 11, 12] |
DIVEST [10, 11, 13, 14] |
DIVEST [10, 11, 14, 15] |
DIVEST [10, 11, 14, 15] |
DIVEST [10, 11, 14, 15] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
| 2008 R2 SP1 |
Approved w/Constraints [9, 10] |
Approved w/Constraints [9, 10] |
Approved w/Constraints [9, 10, 11] |
Approved w/Constraints [10, 11, 12] |
DIVEST [10, 11, 13, 14] |
DIVEST [10, 11, 14, 15] |
DIVEST [10, 11, 14, 15] |
DIVEST [10, 11, 14, 15] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
| 2012 |
Approved w/Constraints [9, 10] |
Approved w/Constraints [9, 10] |
Approved w/Constraints [9, 10, 11] |
Approved w/Constraints [10, 11, 12] |
Approved w/Constraints [10, 11, 13, 14] |
Approved w/Constraints [10, 11, 14, 15] |
Approved w/Constraints [10, 11, 14, 15] |
Approved w/Constraints [10, 11, 14, 15] |
Approved w/Constraints [10, 14, 16, 17, 18] |
Approved w/Constraints [10, 14, 16, 17, 18] |
Approved w/Constraints [10, 14, 17, 18, 19] |
DIVEST [10, 14, 17, 18, 19] |
| 2012 R2 (KB2919355) |
Approved w/Constraints [9, 10] |
Approved w/Constraints [9, 10] |
Approved w/Constraints [9, 10, 11] |
Approved w/Constraints [10, 11, 12] |
Approved w/Constraints [10, 11, 13, 14] |
Approved w/Constraints [10, 11, 14, 15] |
Approved w/Constraints [10, 11, 14, 15] |
Approved w/Constraints [10, 11, 14, 15] |
Approved w/Constraints [10, 14, 16, 17, 18] |
Approved w/Constraints [10, 14, 16, 17, 18] |
Approved w/Constraints [10, 14, 17, 18, 19] |
DIVEST [10, 14, 17, 18, 19] |
| 2016 (v10) |
Approved w/Constraints (PLANNING/EVALUATION) [1, 9, 10] |
Approved w/Constraints (PLANNING/EVALUATION) [1, 9, 10] |
Approved w/Constraints (PLANNING/EVALUATION) [1, 9, 10, 11] |
Approved w/Constraints (PLANNING/EVALUATION) [1, 10, 11, 12] |
Approved w/Constraints [10, 11, 13, 14] |
Approved w/Constraints [10, 11, 14, 15] |
Approved w/Constraints [10, 11, 14, 15] |
Approved w/Constraints [10, 11, 14, 15] |
Approved w/Constraints [10, 14, 16, 17, 18] |
Approved w/Constraints [10, 14, 16, 17, 18] |
Approved w/Constraints [10, 14, 17, 18, 19] |
Approved w/Constraints [10, 14, 17, 18, 19] |
| 2019 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints (PLANNING/EVALUATION) [1, 10, 11, 13, 14] |
Approved w/Constraints (PLANNING/EVALUATION) [1, 10, 11, 14, 15] |
Approved w/Constraints (PLANNING/EVALUATION) [1, 10, 11, 14, 15] |
Approved w/Constraints (PLANNING/EVALUATION) [1, 10, 11, 14, 15] |
Approved w/Constraints (PLANNING/EVALUATION) [1, 10, 14, 16, 17, 18] |
Approved w/Constraints (PLANNING/EVALUATION) [1, 10, 14, 16, 17, 18] |
Approved w/Constraints [10, 14, 17, 18, 19] |
Approved w/Constraints [10, 14, 17, 18, 19] |
| 2022 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
| 2025 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
| Note: |
At the time of writing, version 2025 is the most current version, released 10/01/2022.
A baseline configuration of this technology was developed by the BCM team. At the time of writing, the baseline versions are 2022 and 2025. |
| | | | [9] | Configuration and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles which are defined and maintained by the Core Systems Engineering organization within VA Enterprise Systems Engineering (ESE), must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information.
No new installs of Deprecated Versions are allowed.
Unapproved versions or components can be used only if a waiver, signed by the Deputy CIO of ASD and based upon a recommendation from the AERB, has been granted to the project team or organization that wishes to use the technology. (ref: and FAQ`s #4 and FAQ #5 for information on Decisions and AERB Waivers.)
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only authorized for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to Windows 2008 R2 or 2012 R2.
Due to the critical nature of JASBUG, Windows Server 2003 is TRM unapproved and must only be used when the security risks are outweighed by the benefits as reviewed and authorized by the AERB waiver process. It is recommended that the AERB require all waivered instances of Windows 2003 Server to install Internet Explorer (IE) Version 8 which is the latest supported version of IE for this product.
The use of Windows BitLocker disc encryption that is integrated into the Windows Operating System is unapproved and must only be used when standard VA encryption technology cannot be used and is reviewed and authorized by the AERB waiver process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and authorized by the AERB waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on authorized versions of Windows Server.
| | | [10] | Due to National Institute of Standards and Technology (NIST) identified security vulnerabilities, extra vigilance should be applied to ensure the versions remain properly patched to mitigate known and future vulnerabilities. The local ISO can provide assistance in reviewing the NIST vulnerabilities. | | | [11] | Due to potential information security risks, cloud based technologies may not be used without the approval of the Enterprise Cloud Solution Office (ECSO). This body is in part responsible for ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised. (Ref: VA Directive 6004, VA Directive 6517, VA Directive 6513 and VA Directive 6102). | | | [12] | Configuration and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles which are defined and maintained by the Core Systems Engineering organization within VA Enterprise Systems Engineering (ESE), must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information.
No new installs of Deprecated Versions are allowed.
Unapproved versions or components can be used only if a waiver, signed by the Deputy CIO of ASD and based upon a recommendation from the AERB, has been granted to the project team or organization that wishes to use the technology. (ref: and FAQ`s #4 and FAQ #5 for information on Decisions and AERB Waivers.)
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only authorized for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to Windows 2008 R2 or 2012 R2.
Due to the critical nature of JASBUG, Windows Server 2003 is TRM unapproved and must only be used when the security risks are outweighed by the benefits as reviewed and authorized by the AERB waiver process. It is recommended that the AERB require all waivered instances of Windows 2003 Server to install Internet Explorer (IE) Version 8 which is the latest supported version of IE for this product.
The use of Windows BitLocker disc encryption that is integrated into the Windows Operating System is unapproved and must only be used when standard VA encryption technology cannot be used and is reviewed and authorized by the AERB waiver process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and authorized by the AERB waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on authorized versions of Windows Server.
| | | [13] | VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT authorized for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance.
Windows Server 2019 is in planning and only Solution Delivery Platform Engineering may use or authorize the technology for planning and pilot evaluation purposes until the VA baseline for Server 2019 is published. No production deployment date for Windows 2019 has been set as of this writing.
No new installs of Deprecated Versions are allowed.
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only authorized for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
Due to the critical nature of JASBUG, Windows Server 2003 is TRM unapproved and must only be used when the security risks are outweighed by the benefits as reviewed and authorized by the STAT waiver process. It is recommended that the STAT Working group require all waivered instances of Windows 2003 Server to install Internet Explorer (IE) Version 8 which is the latest supported version of IE for this product.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the authorized individuals by following an authorized process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and authorized by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on authorized versions of Windows Server. | | | [14] | In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004 , VA Directive 6517, and VA Directive 6513. The local ISO can advise on the ESCCB review process. | | | [15] | VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT authorized for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance.
Windows Server 2019 is in planning and only Solution Delivery Platform Engineering may use or authorize the technology for planning and pilot evaluation purposes until the VA baseline for Server 2019 is published. No production deployment date for Windows 2019 has been set as of this writing.
No new installs of Deprecated Versions are allowed.
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only authorized for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the authorized individuals by following an authorized process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and authorized by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on authorized versions of Windows Server. | | | [16] | VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT authorized for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance.
Windows Server 2019 is in planning and only Solution Delivery Platform Engineering may use or authorize the technology for planning and pilot evaluation purposes until the VA baseline for Server 2019 is published. No production deployment date for Windows 2019 has been set as of this writing.
No new installs of Deprecated Versions are allowed.
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only authorized for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the authorized individuals by following an authorized process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and authorized by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on authorized versions of Windows Server. | | | [17] | Due to potential information security risks for cloud-based technologies, users should coordinate closely with their facility ISSO for guidance and assistance on cloud products. If further guidance is needed contact the Enterprise Cloud Solution Office (ECSO), which is the body responsible for new software development in and migration of existing systems to the VA Enterprise Cloud (VAEC) and ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised within the VAEC. For information about Software as a Service (SaaS) products or to submit a SaaS product request with the Project Special Forces (SPF) team, please use their online form.
(Ref: VA Directive 6004, VA Directive 6517, VA Directive 6513 and VA Directive 6102). | | | [18] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | | [19] | Users must ensure that Microsoft Internet Information Services (IIS) and Microsoft Internet Explorer are implemented with VA-authorized baselines.
VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT authorized for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance
No new initial project installs of Deprecated Versions are allowed (existing projects may expand their existing server footprint).
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only authorized for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the authorized individuals by following an authorized process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and authorized by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on authorized versions of Windows Server.
Using the below link, please reference the VA Cyber Security Operations Center (CSOC) Bulletin addressing “VA CSOC SAR S-20-054 Microsoft Addresses `Wormable` RCE Vulnerability in Windows DNS Server” which was published on July 15, 2020.
https://vaww.vashare.oit.va.gov/sites/ois/KnowledgeService/TAAP/Pages/Situational-Awareness-Reports.aspx |
|