<Past |
Future> |
2000 (all versions) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
2003 SP2 |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
2003 R2 SP2 |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
2008 SP2 |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
2008 R2 SP1 |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
2012 |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
2012 R2 (KB2919355) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
2016 (v10) |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
2019 |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (DIVEST) [24, 32, 33, 34, 35, 36] |
2022 |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints [24, 32, 33, 34, 35, 36] |
2025 |
Authorized w/ Constraints (PLANNING/EVALUATION) [1, 24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (PLANNING/EVALUATION) [1, 24, 32, 33, 34, 35, 36] |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Note: |
At the time of writing, version 2025 is the most current version, released 10/01/2022.
A baseline configuration of this technology was developed by the BCM team. At the time of writing, the baseline version is 2022. |
| | [24] | This technology has received one or more VA security bulletins that provide specific guidance on vulnerability patching and mitigation. It is the responsibility of VA system owners to ensure that the appropriate mitigations are taken to address all known and future discovered vulnerabilities with this product. See the Reference tab for more information on security bulletins related to this product. | | [32] | Due to National Institute of Standards and Technology (NIST) identified security vulnerabilities, extra vigilance should be applied to ensure the versions remain properly patched to mitigate known and future vulnerabilities. The local ISSO (Information System Security Officer) can provide assistance in reviewing the NIST vulnerabilities. | | [33] | This technology should only be used when required by a Veterans Affairs (VA) business partner for an authorized VA Project. Use of this technology must comply with ESCCB requirements which include: Signed Interconnection Agreements/Memorandum of Understanding agreements (MOU/ISA) with each external business partner, compliance with VA Handbook 6500, and must implement appropriate National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) requirements for all devices interacting with this technology. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with VA Handbook 6500 and National Institute of Standards and Technology (NIST) standards. As of January 27th, 2017, Risk-based Decisions (RBD) will be handled per VAIQ # 7769667. In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004, VA Directive 6517
and VA Directive 6513. The local ISSO can advise on the ESCCB review process and ensure privacy of information compliance protections are in place. | | [34] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with both VA Handbook 6500 and VA Directive 6500. | | [35] | Users must ensure that Microsoft Internet Information Services (IIS) is implemented with VA-authorized baselines.
Users must ensure that Microsoft Windows Domain is implemented with VA-authorized baselines (refer to the ‘Reference’ tab).
VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT authorized for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance
No new initial project installs of Deprecated Versions are allowed (existing projects may expand their existing server footprint).
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only authorized for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the authorized individuals by following an authorized process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and authorized by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on authorized versions of Windows Server.
Using the below link, please reference the VA Cyber Security Operations Center (CSOC) Bulletin addressing “VA CSOC SAR S-20-054 Microsoft Addresses `Wormable` RCE Vulnerability in Windows DNS Server” which was published on July 15, 2020.
https://vaww.vashare.oit.va.gov/sites/ois/KnowledgeService/TAAP/Pages/Situational-Awareness-Reports.aspx
At the time of this writing, Version 2025 is available for Planning & Evaluation purposes and only Solution Delivery Platform Engineering may use or authorize this technology for Pilot Evaluation purposes until the VA Baseline for Server 2025 is published. | | [36] | Due to potential information security risks for cloud-based technologies, users should coordinate closely with their facility ISSO for guidance and assistance on cloud products. If further guidance is needed contact the Enterprise Cloud Solution Office (ECSO), which is the body responsible for new software development in and migration of existing systems to the VA Enterprise Cloud (VAEC) and ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised within the VAEC. For information about Software as a Service (SaaS) products or to submit a SaaS product request, visit the Product Marketplace. (Ref: VA Directive 6004, VA Directive 6517, VA Directive 6513 and VA Directive 6102). |
|