<Past |
Future> |
2000 (all versions) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2003 SP2 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2003 R2 SP2 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2008 SP2 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2008 R2 SP1 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2012 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2012 R2 (KB2919355) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2016 (v10) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2019 |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
Divest [23, 32, 33, 34, 35, 36] |
2022 |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
Approved w/Constraints [23, 32, 33, 34, 35, 36] |
2025 |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
Approved w/Constraints [1, 23, 32, 33, 34, 35, 36] |
| | [1] | This Technology is currently being evaluated, reviewed, and tested in controlled environments. Use of this technology is strictly controlled and not available for use within the general population. | | [2] | Product must remain patched and operated in accordance with Federal and Department security and privacy policies and guidelines. Configuration and deployment standards for Windows server images, which are defined and maintained by the Core Systems Engineering organization within VA Enterprise Systems Engineering must be followed and adhered to unless an appropriate waiver is granted.
The use of Windows BitLocker disc encryption that is integrated into the Windows Operating System is not allowed without a waiver from the Core Systems Engineering and/or Client Services organizations within VA Enterprise Systems Engineering. | | [3] | Product must remain patched and operated in accordance with Federal and Department security and privacy policies and guidelines. Configuration and deployment standards for Windows server images which are defined and maintained by the Core Systems Engineering organization within VA Enterprise Systems Engineering must be followed and adhered to unless an appropriate waiver is granted by the AERB.
No new installs of Deprecated Versions are allowed without a waiver.
The use of Windows BitLocker disc encryption that is integrated into the Windows Operating System is not allowed without a waiver.
The Windows Defender component of the optional Desktop Experience package is not allowed to be used without a waiver. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
The Hyper-V Role may only be used on approved versions of Windows Server identified on the version tab of this entry, versions 2008 R2 and later, and following Hyper-V Role version and configuration standards set by ESE Core Systems Engineering Services for Hyper-V Roles. | | [4] | Product must remain patched and operated in accordance with Federal and Department security and privacy policies and guidelines. Configuration and deployment standards for Windows server images which are defined and maintained by the Core Systems Engineering organization within VA Enterprise Systems Engineering must be followed and adhered to unless an appropriate waiver is granted by the AERB.
No new installs of Deprecated Versions are allowed. Windows Server 2014 (v10) Preview is in planning and only Enterprise System Engineering (ESE) Core Engineering may use the technology at this time for planning purposes. No production deployment date for Windows 2014 (v10) has been set as of this writing.
The use of Windows BitLocker disc encryption that is integrated into the Windows Operating System is not allowed without a waiver.
The Windows Defender component of the optional Desktop Experience package is not allowed to be used without a waiver. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
The Hyper-V Role may only be used on approved versions of Windows Server identified on the version tab of this entry, versions 2008 R2 and later, and following Hyper-V Role version and configuration standards set by ESE Core Systems Engineering Services for Hyper-V Roles.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server. | | [5] | Configuration and deployment standards for Windows Server images, including standards for Hyper-V Roles, which are defined and maintained by the Core Systems Engineering organization within VA Enterprise Systems Engineering (ESE) must be followed and adhered to unless an appropriate waiver is granted. Detailed information can be found at the following location: https://vaww.sde.portal.va.gov/svcs/sma/BCM/SitePages/Home.aspx
No new installs of Deprecated Versions are allowed.
Unapproved versions or components can be used only if a waiver, signed by the Deputy CIO of ASD and based upon a recommendation from the AERB, has been granted to the project team or organization that wishes to use the technology. (ref: and FAQ`s #4 and FAQ #5 for information on Decisions and AERB Waivers.)
Due to the critical nature of JASBUG, Windows Server 2003 is TRM unapproved and should only be used when the security risks are outweighed by the benefits as reviewed and approved by the AERB waiver process.
The use of Windows BitLocker disc encryption that is integrated into the Windows Operating System is unapproved and should only be used when standard VA encryption technology cannot be used and is reviewed and approved by the AERB waiver process.
The Windows Defender component of the optional Desktop Experience package is unapproved and should only be used when standard VA security technology cannot be used and is reviewed and approved by the AERB waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server. | | [6] | Technology must remain patched and operated in accordance with Federal and Department security policies and guidelines in order to mitigate known and future security vulnerabilities. | | [7] | Configuration and deployment standards for Windows Server images including standards for Active Directory and Hyper-V Roles which are defined and maintained by the Core Systems Engineering organization within VA Enterprise Systems Engineering (ESE) must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information.
No new installs of Deprecated Versions are allowed.
Unapproved versions or components can be used only if a waiver, signed by the Deputy CIO of ASD and based upon a recommendation from the AERB, has been granted to the project team or organization that wishes to use the technology. (ref: and FAQ`s #4 and FAQ #5 for information on Decisions and AERB Waivers.)
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) should migrate to Windows 2008 R2 or 2012 R2.
Due to the critical nature of JASBUG, Windows Server 2003 is TRM unapproved and should only be used when the security risks are outweighed by the benefits as reviewed and approved by the AERB waiver process. It is recommended that the AERB require all waivered instances of Windows 2003 Server to install Internet Explorer (IE) Version 8 which is the latest supported version of IE for this product.
The use of Windows BitLocker disc encryption that is integrated into the Windows Operating System is unapproved and should only be used when standard VA encryption technology cannot be used and is reviewed and approved by the AERB waiver process.
The Windows Defender component of the optional Desktop Experience package is unapproved and should only be used when standard VA security technology cannot be used and is reviewed and approved by the AERB waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server.
| | [8] | Configuration and deployment standards for Windows Server images including standards for Active Directory and Hyper-V Roles which are defined and maintained by the Core Systems Engineering organization within VA Enterprise Systems Engineering (ESE) must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information.
No new installs of Deprecated Versions are allowed.
Unapproved versions or components can be used only if a waiver, signed by the Deputy CIO of ASD and based upon a recommendation from the AERB, has been granted to the project team or organization that wishes to use the technology. (ref: and FAQ`s #4 and FAQ #5 for information on Decisions and AERB Waivers.)
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) should migrate to Windows 2008 R2 or 2012 R2.
Due to the critical nature of JASBUG, Windows Server 2003 is TRM unapproved and should only be used when the security risks are outweighed by the benefits as reviewed and approved by the AERB waiver process. It is recommended that the AERB require all waivered instances of Windows 2003 Server to install Internet Explorer (IE) Version 8 which is the latest supported version of IE for this product.
The use of Windows BitLocker disc encryption that is integrated into the Windows Operating System is unapproved and should only be used when standard VA encryption technology cannot be used and is reviewed and approved by the AERB waiver process.
The Windows Defender component of the optional Desktop Experience package is unapproved and should only be used when standard VA security technology cannot be used and is reviewed and approved by the AERB waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and should not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server.
| | [9] | Configuration and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles which are defined and maintained by the Core Systems Engineering organization within VA Enterprise Systems Engineering (ESE), must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information.
No new installs of Deprecated Versions are allowed.
Unapproved versions or components can be used only if a waiver, signed by the Deputy CIO of ASD and based upon a recommendation from the AERB, has been granted to the project team or organization that wishes to use the technology. (ref: and FAQ`s #4 and FAQ #5 for information on Decisions and AERB Waivers.)
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to Windows 2008 R2 or 2012 R2.
Due to the critical nature of JASBUG, Windows Server 2003 is TRM unapproved and must only be used when the security risks are outweighed by the benefits as reviewed and approved by the AERB waiver process. It is recommended that the AERB require all waivered instances of Windows 2003 Server to install Internet Explorer (IE) Version 8 which is the latest supported version of IE for this product.
The use of Windows BitLocker disc encryption that is integrated into the Windows Operating System is unapproved and must only be used when standard VA encryption technology cannot be used and is reviewed and approved by the AERB waiver process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the AERB waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server.
| | [10] | Due to National Institute of Standards and Technology (NIST) identified security vulnerabilities, extra vigilance should be applied to ensure the versions remain properly patched to mitigate known and future vulnerabilities. The local ISO can provide assistance in reviewing the NIST vulnerabilities. | | [11] | Due to potential information security risks, cloud based technologies may not be used without the approval of the Enterprise Cloud Solution Office (ECSO). This body is in part responsible for ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised. (Ref: VA Directive 6004, VA Directive 6517, VA Directive 6513 and VA Directive 6102). | | [12] | Configuration and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles which are defined and maintained by the Core Systems Engineering organization within VA Enterprise Systems Engineering (ESE), must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information.
No new installs of Deprecated Versions are allowed.
Unapproved versions or components can be used only if a waiver, signed by the Deputy CIO of ASD and based upon a recommendation from the AERB, has been granted to the project team or organization that wishes to use the technology. (ref: and FAQ`s #4 and FAQ #5 for information on Decisions and AERB Waivers.)
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to Windows 2008 R2 or 2012 R2.
Due to the critical nature of JASBUG, Windows Server 2003 is TRM unapproved and must only be used when the security risks are outweighed by the benefits as reviewed and approved by the AERB waiver process. It is recommended that the AERB require all waivered instances of Windows 2003 Server to install Internet Explorer (IE) Version 8 which is the latest supported version of IE for this product.
The use of Windows BitLocker disc encryption that is integrated into the Windows Operating System is unapproved and must only be used when standard VA encryption technology cannot be used and is reviewed and approved by the AERB waiver process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the AERB waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server.
| | [13] | VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT approved for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance.
Windows Server 2019 is in planning and only Solution Delivery Platform Engineering may use or authorize the technology for planning and pilot evaluation purposes until the VA baseline for Server 2019 is published. No production deployment date for Windows 2019 has been set as of this writing.
No new installs of Deprecated Versions are allowed.
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
Due to the critical nature of JASBUG, Windows Server 2003 is TRM unapproved and must only be used when the security risks are outweighed by the benefits as reviewed and approved by the STAT waiver process. It is recommended that the STAT Working group require all waivered instances of Windows 2003 Server to install Internet Explorer (IE) Version 8 which is the latest supported version of IE for this product.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the approved individuals by following an approved process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server. | | [14] | In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004 , VA Directive 6517, and VA Directive 6513. The local ISO can advise on the ESCCB review process. | | [15] | VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT approved for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance.
Windows Server 2019 is in planning and only Solution Delivery Platform Engineering may use or authorize the technology for planning and pilot evaluation purposes until the VA baseline for Server 2019 is published. No production deployment date for Windows 2019 has been set as of this writing.
No new installs of Deprecated Versions are allowed.
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the approved individuals by following an approved process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server. | | [16] | VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT approved for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance.
Windows Server 2019 is in planning and only Solution Delivery Platform Engineering may use or authorize the technology for planning and pilot evaluation purposes until the VA baseline for Server 2019 is published. No production deployment date for Windows 2019 has been set as of this writing.
No new installs of Deprecated Versions are allowed.
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the approved individuals by following an approved process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server. | | [17] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [18] | Due to potential information security risks for cloud-based technologies, users should coordinate closely with their facility ISSO for guidance and assistance on cloud products. If further guidance is needed contact the Enterprise Cloud Solution Office (ECSO), which is the body responsible for new software development in and migration of existing systems to the VA Enterprise Cloud (VAEC) and ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised within the VAEC. For information about Software as a Service (SaaS) products or to submit a SaaS product request with the Project Special Forces (SPF) team, please use their online form.
(Ref: VA Directive 6004, VA Directive 6517, VA Directive 6513 and VA Directive 6102). | | [19] | Users must ensure that Microsoft Internet Information Services (IIS) and Microsoft Internet Explorer are implemented with VA-approved baselines.
VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT approved for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance
No new initial project installs of Deprecated Versions are allowed (existing projects may expand their existing server footprint).
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the approved individuals by following an approved process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server.
Using the below link, please reference the VA Cyber Security Operations Center (CSOC) Bulletin addressing “VA CSOC SAR S-20-054 Microsoft Addresses `Wormable` RCE Vulnerability in Windows DNS Server” which was published on July 15, 2020.
https://vaww.vashare.oit.va.gov/sites/ois/KnowledgeService/TAAP/Pages/Situational-Awareness-Reports.aspx | | [20] | In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004 , VA Directive 6517, and VA Directive 6513. The local ISO can advise on the ESCCB review process. | | [21] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [22] | Due to potential information security risks for cloud-based technologies, users should coordinate closely with their facility ISSO for guidance and assistance on cloud products. If further guidance is needed contact the Enterprise Cloud Solution Office (ECSO), which is the body responsible for new software development in and migration of existing systems to the VA Enterprise Cloud (VAEC) and ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised within the VAEC. For information about Software as a Service (SaaS) products or to submit a SaaS product request with the Project Special Forces (SPF) team, please use their online form.
(Ref: VA Directive 6004, VA Directive 6517, VA Directive 6513 and VA Directive 6102). | | [23] | This technology has received one or more VA security bulletins that provide specific guidance on vulnerability patching and mitigation. It is the responsibility of VA system owners to ensure that the appropriate mitigations are taken to address all known and future discovered vulnerabilities with this product. See the Reference tab for more information on security bulletins related to this product. | | [24] | This technology should only be used when required by a Veterans Affairs (VA) business partner for an approved VA Project. Use of this technology must comply with ESCCB requirements which include: Signed Interconnection Agreements/Memorandum of Understanding agreements (MOU/ISA) with each external business partner, compliance with VA Handbook 6500, and must implement appropriate National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) requirements for all devices interacting with this technology. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500 and National Institute of Standards and Technology (NIST) standards. As of January 27th, 2017, Risk-based Decisions (RBD) will be handled per VAIQ # 7769667. In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004, VA Directive 6517
and VA Directive 6513. The local ISO can advise on the ESCCB review process and ensure privacy of information compliance protections are in place. | | [25] | Users must ensure that Microsoft Internet Information Services (IIS) and Microsoft Internet Explorer are implemented with VA-approved baselines.
Users must ensure that Microsoft Windows Domain is implemented with VA-approved baselines (refer to the ‘Reference’ tab).
VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT approved for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance
No new initial project installs of Deprecated Versions are allowed (existing projects may expand their existing server footprint).
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the approved individuals by following an approved process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server.
Using the below link, please reference the VA Cyber Security Operations Center (CSOC) Bulletin addressing “VA CSOC SAR S-20-054 Microsoft Addresses `Wormable` RCE Vulnerability in Windows DNS Server” which was published on July 15, 2020.
https://vaww.vashare.oit.va.gov/sites/ois/KnowledgeService/TAAP/Pages/Situational-Awareness-Reports.aspx
At the time of this writing, Version 2022 is available for Planning & Evaluation purposes and only Solution Delivery Platform Engineering may use or authorize this technology for Pilot Evaluation purposes until the VA Baseline for Server 2022 is published. | | [26] | Due to potential information security risks for cloud-based technologies, users should coordinate closely with their facility ISSO for guidance and assistance on cloud products. If further guidance is needed contact the Enterprise Cloud Solution Office (ECSO), which is the body responsible for new software development in and migration of existing systems to the VA Enterprise Cloud (VAEC) and ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised within the VAEC. For information about Software as a Service (SaaS) products or to submit a SaaS product request with the Project Special Forces (PSF) team, please use their online form.
(Ref: VA Directive 6004, VA Directive 6517, VA Directive 6513 and VA Directive 6102). | | [27] | Users must ensure that Microsoft Internet Information Services (IIS) and Microsoft Internet Explorer are implemented with VA-approved baselines.
Users must ensure that Microsoft Windows Domain is implemented with VA-approved baselines (refer to the ‘Reference’ tab).
VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT approved for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance
No new initial project installs of Deprecated Versions are allowed (existing projects may expand their existing server footprint).
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the approved individuals by following an approved process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server.
Using the below link, please reference the VA Cyber Security Operations Center (CSOC) Bulletin addressing “VA CSOC SAR S-20-054 Microsoft Addresses `Wormable` RCE Vulnerability in Windows DNS Server” which was published on July 15, 2020.
https://vaww.vashare.oit.va.gov/sites/ois/KnowledgeService/TAAP/Pages/Situational-Awareness-Reports.aspx
At the time of this writing, Version 2022 is available for Planning & Evaluation purposes and only Solution Delivery Platform Engineering may use or authorize this technology for Pilot Evaluation purposes until the VA Baseline for Server 2022 is published.
Versions 2008 and 2008 R2 have been reverted to unapproved status until Jan 13, 2023 to allow for waivered use by business critical applications. Use of these versions of Windows during this period must have current POAM(s) for remediation by Jan 13, 2023 when all support for these versions ends and these versions return to TRM prohibited status. | | [28] | Due to potential information security risks for cloud-based technologies, users should coordinate closely with their facility ISSO for guidance and assistance on cloud products. If further guidance is needed contact the Enterprise Cloud Solution Office (ECSO), which is the body responsible for new software development in and migration of existing systems to the VA Enterprise Cloud (VAEC) and ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised within the VAEC. For information about Software as a Service (SaaS) products or to submit a SaaS product request with the VA OIT Product Engineering team, please use their online form.
(Ref: VA Directive 6004, VA Directive 6517, VA Directive 6513 and VA Directive 6102). | | [29] | Users must ensure that Microsoft Internet Information Services (IIS) is implemented with VA-approved baselines.
Users must ensure that Microsoft Windows Domain is implemented with VA-approved baselines (refer to the ‘Reference’ tab).
VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT approved for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance
No new initial project installs of Deprecated Versions are allowed (existing projects may expand their existing server footprint).
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the approved individuals by following an approved process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server.
Using the below link, please reference the VA Cyber Security Operations Center (CSOC) Bulletin addressing “VA CSOC SAR S-20-054 Microsoft Addresses `Wormable` RCE Vulnerability in Windows DNS Server” which was published on July 15, 2020.
https://vaww.vashare.oit.va.gov/sites/ois/KnowledgeService/TAAP/Pages/Situational-Awareness-Reports.aspx
At the time of this writing, Version 2022 is available for Planning & Evaluation purposes and only Solution Delivery Platform Engineering may use or authorize this technology for Pilot Evaluation purposes until the VA Baseline for Server 2022 is published.
Versions 2008 and 2008 R2 have been reverted to unapproved status until Jan 13, 2023 to allow for waivered use by business critical applications. Use of these versions of Windows during this period must have current POAM(s) for remediation by Jan 13, 2023 when all support for these versions ends and these versions return to TRM prohibited status. | | [30] | Users must ensure that Microsoft Internet Information Services (IIS) is implemented with VA-approved baselines.
Users must ensure that Microsoft Windows Domain is implemented with VA-approved baselines (refer to the ‘Reference’ tab).
VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT approved for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance
No new initial project installs of Deprecated Versions are allowed (existing projects may expand their existing server footprint).
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the approved individuals by following an approved process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server.
Using the below link, please reference the VA Cyber Security Operations Center (CSOC) Bulletin addressing “VA CSOC SAR S-20-054 Microsoft Addresses `Wormable` RCE Vulnerability in Windows DNS Server” which was published on July 15, 2020.
https://vaww.vashare.oit.va.gov/sites/ois/KnowledgeService/TAAP/Pages/Situational-Awareness-Reports.aspx
At the time of this writing, Version 2022 is available for Planning & Evaluation purposes and only Solution Delivery Platform Engineering may use or authorize this technology for Pilot Evaluation purposes until the VA Baseline for Server 2022 is published. | | [31] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with VA Handbook 6500. | | [32] | Due to National Institute of Standards and Technology (NIST) identified security vulnerabilities, extra vigilance should be applied to ensure the versions remain properly patched to mitigate known and future vulnerabilities. The local ISSO (Information System Security Officer) can provide assistance in reviewing the NIST vulnerabilities. | | [33] | This technology should only be used when required by a Veterans Affairs (VA) business partner for an approved VA Project. Use of this technology must comply with ESCCB requirements which include: Signed Interconnection Agreements/Memorandum of Understanding agreements (MOU/ISA) with each external business partner, compliance with VA Handbook 6500, and must implement appropriate National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) requirements for all devices interacting with this technology. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with VA Handbook 6500 and National Institute of Standards and Technology (NIST) standards. As of January 27th, 2017, Risk-based Decisions (RBD) will be handled per VAIQ # 7769667. In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004, VA Directive 6517
and VA Directive 6513. The local ISSO can advise on the ESCCB review process and ensure privacy of information compliance protections are in place. | | [34] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with both VA Handbook 6500 and VA Directive 6500. | | [35] | Users must ensure that Microsoft Internet Information Services (IIS) is implemented with VA-approved baselines.
Users must ensure that Microsoft Windows Domain is implemented with VA-approved baselines (refer to the ‘Reference’ tab).
VA security configuration baseline standards and deployment standards for Windows Server images, including standards for Active Directory and Hyper-V Roles, must be followed and adhered to unless an appropriate waiver is granted. See the reference section for more information and links to the official standards.
The following versions/editions of Windows Server are NOT approved for VA use: - Semi-annual Releases (i.e. Windows Server version 1709 or vNext) - Non-Enterprise versions i.e. Small Business Edition, Essentials and Home Server - OEM versions, including Storage Server
The VA will use Long Term Service Branch (LTSB) releases only for Windows Server to allow security policy compliance
No new initial project installs of Deprecated Versions are allowed (existing projects may expand their existing server footprint).
Windows Server 2008 SP2 is deprecated after 6/1/2015 and is only approved for use on servers that support SCCM 2007. Non-SCCM servers running Windows 2008 (non-R2) must migrate to a supported version.
The use of Windows BitLocker disk encryption integrated into the Windows Operating System may be used for full volume encryption provided that the following conditions are met: 1) A TPM chip is present on the machine (either physical or virtual) and used to store the disk encryption certificate(s) and; 2) A robust solution is employed to ensure that the BitLocker recovery key is available to the approved individuals by following an approved process.
The Windows Defender component of the optional Desktop Experience package is unapproved and must only be used when standard VA security technology cannot be used and is reviewed and approved by the STAT waiver process. After the install of the optional Desktop Experience package, the Windows Defender Service must be disabled and deleted using the `SC Delete` command to prevent it from being enabled.
Windows Internal Database (WID) is authorized only for use by Windows Server and must not be used by any end-user applications. See the `Component` section of this TRM entry for more details.
The Microsoft Virtual Server component which was replaced by the Hyper-V Role is prohibited from use and users must use the Hyper-V Role on approved versions of Windows Server.
Using the below link, please reference the VA Cyber Security Operations Center (CSOC) Bulletin addressing “VA CSOC SAR S-20-054 Microsoft Addresses `Wormable` RCE Vulnerability in Windows DNS Server” which was published on July 15, 2020.
https://vaww.vashare.oit.va.gov/sites/ois/KnowledgeService/TAAP/Pages/Situational-Awareness-Reports.aspx
At the time of this writing, Version 2025 is available for Planning & Evaluation purposes and only Solution Delivery Platform Engineering may use or authorize this technology for Pilot Evaluation purposes until the VA Baseline for Server 2025 is published. | | [36] | Due to potential information security risks for cloud-based technologies, users should coordinate closely with their facility ISSO for guidance and assistance on cloud products. If further guidance is needed contact the Enterprise Cloud Solution Office (ECSO), which is the body responsible for new software development in and migration of existing systems to the VA Enterprise Cloud (VAEC) and ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised within the VAEC. For information about Software as a Service (SaaS) products or to submit a SaaS product request, visit the Product Marketplace.
(Ref: VA Directive 6004, VA Directive 6517, VA Directive 6513 and VA Directive 6102). |
|
Note: |
At the time of writing, version 2025 is the most current version, released 10/01/2022.
A baseline configuration of this technology was developed by the BCM team. At the time of writing, the baseline version is 2022. |