Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
openscap /
schemas /
oval /
5.11 /
[ HOME SHELL ]
Name
Size
Permission
Action
aix-definitions-schema.xsd
52.12
KB
-rw-r--r--
aix-system-characteristics-sch...
24.24
KB
-rw-r--r--
android-definitions-schema.xsd
99.3
KB
-rw-r--r--
android-system-characteristics...
58.82
KB
-rw-r--r--
apache-definitions-schema.xsd
13.31
KB
-rw-r--r--
apache-system-characteristics-...
5.7
KB
-rw-r--r--
apple-ios-definitions-schema.x...
39.87
KB
-rw-r--r--
apple-ios-system-characteristi...
29.22
KB
-rw-r--r--
asa-definitions-schema.xsd
119.2
KB
-rw-r--r--
asa-system-characteristics-sch...
55.82
KB
-rw-r--r--
catos-definitions-schema.xsd
37.94
KB
-rw-r--r--
catos-system-characteristics-s...
15.92
KB
-rw-r--r--
esx-definitions-schema.xsd
51.7
KB
-rw-r--r--
esx-system-characteristics-sch...
20.37
KB
-rw-r--r--
freebsd-definitions-schema.xsd
13.63
KB
-rw-r--r--
freebsd-system-characteristics...
7.02
KB
-rw-r--r--
hpux-definitions-schema.xsd
66.97
KB
-rw-r--r--
hpux-system-characteristics-sc...
19.47
KB
-rw-r--r--
independent-definitions-schema...
250.86
KB
-rw-r--r--
independent-system-characteris...
86.93
KB
-rw-r--r--
ios-definitions-schema.xsd
183.57
KB
-rw-r--r--
ios-system-characteristics-sch...
78.97
KB
-rw-r--r--
iosxe-definitions-schema.xsd
135.61
KB
-rw-r--r--
iosxe-system-characteristics-s...
62.13
KB
-rw-r--r--
junos-definitions-schema.xsd
35.04
KB
-rw-r--r--
junos-system-characteristics-s...
14.05
KB
-rw-r--r--
linux-definitions-schema.xsd
226.33
KB
-rw-r--r--
linux-system-characteristics-s...
104.75
KB
-rw-r--r--
macos-definitions-schema.xsd
227.51
KB
-rw-r--r--
macos-system-characteristics-s...
90.36
KB
-rw-r--r--
netconf-definitions-schema.xsd
11.07
KB
-rw-r--r--
netconf-system-characteristics...
3.93
KB
-rw-r--r--
oval-common-schema.xsd
74.93
KB
-rw-r--r--
oval-definitions-schema.xsd
175.93
KB
-rw-r--r--
oval-definitions-schematron.xs...
646.85
KB
-rw-r--r--
oval-directives-schema.xsd
7.56
KB
-rw-r--r--
oval-directives-schematron.xsl
69.75
KB
-rw-r--r--
oval-results-schema.xsd
70.5
KB
-rw-r--r--
oval-results-schematron.xsl
69.69
KB
-rw-r--r--
oval-system-characteristic-sch...
36.56
KB
-rw-r--r--
oval-system-characteristics-sc...
56.49
KB
-rw-r--r--
oval-variables-schema.xsd
7.47
KB
-rw-r--r--
oval-variables-schematron.xsl
6.62
KB
-rw-r--r--
pixos-definitions-schema.xsd
17.41
KB
-rw-r--r--
pixos-system-characteristics-s...
6.9
KB
-rw-r--r--
sharepoint-definitions-schema....
197.36
KB
-rw-r--r--
sharepoint-system-characterist...
93.89
KB
-rw-r--r--
solaris-definitions-schema.xsd
175.55
KB
-rw-r--r--
solaris-system-characteristics...
68.64
KB
-rw-r--r--
unix-definitions-schema.xsd
269.79
KB
-rw-r--r--
unix-system-characteristics-sc...
123.24
KB
-rw-r--r--
windows-definitions-schema.xsd
1.02
MB
-rw-r--r--
windows-system-characteristics...
456.07
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : windows-definitions-schema.xsd
<?xml version="1.0" encoding="utf-8"?> <xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:win-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#windows" xmlns:sch="http://purl.oclc.org/dsdl/schematron" targetNamespace="http://oval.mitre.org/XMLSchema/oval-definitions-5#windows" elementFormDefault="qualified" version="5.11"> <xsd:import namespace="http://oval.mitre.org/XMLSchema/oval-common-5" schemaLocation="oval-common-schema.xsd"/> <xsd:import namespace="http://oval.mitre.org/XMLSchema/oval-definitions-5" schemaLocation="oval-definitions-schema.xsd"/> <xsd:annotation> <xsd:documentation>The following is a description of the elements, types, and attributes that compose the Windows specific tests found in Open Vulnerability and Assessment Language (OVAL). Each test is an extension of the standard test element defined in the Core Definition Schema. Through extension, each test inherits a set of elements and attributes that are shared amongst all OVAL tests. Each test is described in detail and should provide the information necessary to understand what each element and attribute represents. This document is intended for developers and assumes some familiarity with XML. A high level description of the interaction between the different tests and their relationship to the Core Definition Schema is not outlined here.</xsd:documentation> <xsd:documentation>The OVAL Schema is maintained by The MITRE Corporation and developed by the public OVAL Community. For more information, including how to get involved in the project and how to submit change requests, please visit the OVAL website at http://oval.mitre.org.</xsd:documentation> <xsd:appinfo> <schema>Windows Definition</schema> <version>5.11:5.11</version> <date>12/18/2014 09:00:00 AM</date> <terms_of_use>Copyright (c) 2002-2014, The MITRE Corporation. All rights reserved. The contents of this file are subject to the terms of the OVAL License located at http://oval.mitre.org/oval/about/termsofuse.html. See the OVAL License for the specific language governing permissions and limitations for use of this schema. When distributing copies of the OVAL Schema, this license header must be included.</terms_of_use> <sch:ns prefix="oval-def" uri="http://oval.mitre.org/XMLSchema/oval-definitions-5"/> <sch:ns prefix="win-def" uri="http://oval.mitre.org/XMLSchema/oval-definitions-5#windows"/> <sch:ns prefix="xsi" uri="http://www.w3.org/2001/XMLSchema-instance"/> </xsd:appinfo> </xsd:annotation> <!-- =============================================================================== --> <!-- ============================ ACCESS TOKEN TEST ============================= --> <!-- =============================================================================== --> <xsd:element name="accesstoken_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The accesstoken_test is used to check the properties of a Windows access token as well as individual privileges and rights associated with it. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references an accesstoken_object and the optional state element specifies the data to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>accesstoken_test</oval:test> <oval:object>accesstoken_object</oval:object> <oval:state>accesstoken_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">accesstoken_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>Replaced by the userrights_test. This accesstoken_test suffers from scalability issues when run on a domain controller and should not be used. See the userrights_test.</oval:reason> <oval:comment>This test has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_accesstokentst_dep"> <sch:rule context="win-def:accesstoken_test"> <sch:report test="true()">DEPRECATED TEST: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_attst"> <sch:rule context="win-def:accesstoken_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:accesstoken_object/@id"><sch:value-of select="../@id"/> - the object child element of an accesstoken_test must reference an accesstoken_object</sch:assert> </sch:rule> <sch:rule context="win-def:accesstoken_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:accesstoken_state/@id"><sch:value-of select="../@id"/> - the state child element of an accesstoken_test must reference an accesstoken_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="accesstoken_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The accesstoken_object element is used by an access token test to define the object to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>An accesstoken_object consists of a single security principle that identifies user, group, or computer account that is associated with the token.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>Replaced by the userrights_object. The accesstoken_test suffers from scalability issues when run on a domain controller and should not be used. See the userrights_object.</oval:reason> <oval:comment>This object has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_accesstokenobj_dep"> <sch:rule context="win-def:accesstoken_object"> <sch:report test="true()">DEPRECATED OBJECT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_accesstoken_object_verify_filter_state"> <sch:rule context="win-def:accesstoken_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:accesstoken_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='accesstoken_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:AccesstokenBehaviors" minOccurs="0"/> <xsd:element name="security_principle" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The security_principle element defines the access token being specified. Security principles include users or groups with either local or domain accounts, and computer accounts created when a computer joins a domain. In Windows, security principles are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. User rights and permissions to access objects such as Active Directory objects, files, and registry settings are assigned to security principles. In a domain environment, security principles should be identified in the form: "domain\trustee name". For local security principles use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain. If an operation other than equals is used to identify matching trustees (i.e. not equal, or a pattern match) then the resulting matches shall be limited to only the trustees referenced in the Local Security Authority database. The scope is limited here to avoid unnecessarily resource intensive searches for trustees. Note that the larger scope of all known trustees may be obtained through the use of variables.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="accesstoken_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The accesstoken_state element defines the different information that can be used to evaluate the specified access tokens. This includes the multitude of user rights and permissions that can be granted. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>Replaced by the userrights_state. The accesstoken_test suffers from scalability issues when run on a domain controller and should not be used. See the userrights_state.</oval:reason> <oval:comment>This state has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_accesstokenste_dep"> <sch:rule context="win-def:accesstoken_state"> <sch:report test="true()">DEPRECATED STATE: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="security_principle" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The security_principle element identifies an access token to test for. Security principles include users or groups with either local or domain accounts, and computer accounts created when a computer joins a domain. In Windows, security principles are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. User rights and permissions to access objects such as Active Directory objects, files, and registry settings are assigned to security principles. In a domain environment, security principles should be identified in the form: "domain\trustee name". For local security principles use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seassignprimarytokenprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seassignprimarytokenprivilege privilege is enabled, it allows a parent process to replace the access token that is associated with a child process.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seauditprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seauditprivilege privilege is enabled, it allows a process to generate audit records in the security log. The security log can be used to trace unauthorized system access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sebackupprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the sebackupprivilege privilege is enabled, it allows the user to circumvent file and directory permissions to back up the system. The privilege is selected only when an application attempts access by using the NTFS backup application programming interface (API). Otherwise, normal file and directory permissions apply.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sechangenotifyprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the sechangenotifyprivilege privilege is enabled, it allows the user to pass through folders to which the user otherwise has no access while navigating an object path in the NTFS file system or in the registry. This privilege does not allow the user to list the contents of a folder; it allows the user only to traverse its directories.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="secreateglobalprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the secreateglobalprivilege privilege is enabled, it allows the user to create named file mapping objects in the global namespace during Terminal Services sessions.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="secreatepagefileprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the secreatepagefileprivilege privilege is enabled, it allows the user to create and change the size of a pagefile.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="secreatepermanentprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the secreatepermanentprivilege privilege is enabled, it allows a process to create a directory object in the object manager. It is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode have this privilege inherently.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="secreatesymboliclinkprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the secreatesymboliclinkprivilege privilege is enabled, it allows users to create symbolic links.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="secreatetokenprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the secreatetokenprivilege privilege is enabled, it allows a process to create an access token by calling NtCreateToken() or other token-creating APIs.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sedebugprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the sedebugprivilege privilege is enabled, it allows the user to attach a debugger to any process. It provides access to sensitive and critical operating system components.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seenabledelegationprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seenabledelegationprivilege privilege is enabled, it allows the user to change the Trusted for Delegation setting on a user or computer object in Active Directory. The user or computer that is granted this privilege must also have write access to the account control flags on the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seimpersonateprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seimpersonateprivilege privilege is enabled, it allows the user to impersonate a client after authentication.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seincreasebasepriorityprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seincreasebasepriorityprivilege privilege is enabled, it allows a user to increase the base priority class of a process.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seincreasequotaprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seincreasequotaprivilege privilege is enabled, it allows a process that has access to a second process to increase the processor quota assigned to the second process.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seincreaseworkingsetprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seincreaseworkingsetprivilege privilege is enabled, it allows a user to increase a process working set.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seloaddriverprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seloaddriverprivilege privilege is enabled, it allows a user to install and remove drivers for Plug and Play devices.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="selockmemoryprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the selockmemoryprivilege privilege is enabled, it allows a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="semachineaccountprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the semachineaccountprivilege privilege is enabled, it allows the user to add a computer to a specific domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="semanagevolumeprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the semanagevolumeprivilege privilege is enabled, it allows a non-administrative or remote user to manage volumes or disks.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seprofilesingleprocessprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seprofilesingleprocessprivilege privilege is enabled, it allows a user to sample the performance of an application process.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="serelabelprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the serelabelprivilege privilege is enabled, it allows a user to modify an object label.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seremoteshutdownprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seremoteshutdownprivilege privilege is enabled, it allows a user to shut down a computer from a remote location on the network. </xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="serestoreprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the serestoreprivilege privilege is enabled, it allows a user to circumvent file and directory permissions when restoring backed-up files and directories and to set any valid security principle as the owner of an object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sesecurityprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the sesecurityprivilege privilege is enabled, it allows a user to specify object access auditing options for individual resources such as files, Active Directory objects, and registry keys. A user who has this privilege can also view and clear the security log from Event Viewer.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seshutdownprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seshutdownprivilege privilege is enabled, it allows a user to shut down the local computer.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sesyncagentprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the sesyncagentprivilege privilege is enabled, it allows a process to read all objects and properties in the directory, regardless of the protection on the objects and properties. It is required in order to use Lightweight Directory Access Protocol (LDAP) directory synchronization (Dirsync) services.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sesystemenvironmentprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the sesystemenvironmentprivilege privilege is enabled, it allows modification of system environment variables either by a process through an API or by a user through System Properties.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sesystemprofileprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the sesystemprofileprivilege privilege is enabled, it allows a user to sample the performance of system processes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sesystemtimeprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the sesystemtimeprivilege privilege is enabled, it allows the user to adjust the time on the computer's internal clock. It is not required to change the time zone or other display characteristics of the system time.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="setakeownershipprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the setakeownershipprivilege privilege is enabled, it allows a user to take ownership of any securable object in the system, including Active Directory objects, NTFS files and folders, printers, registry keys, services, processes, and threads.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="setcbprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the setcbprivilege privilege is enabled, it allows a process to assume the identity of any user and thus gain access to the resources that the user is authorized to access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="setimezoneprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the setimezoneprivilege privilege is enabled, it allows the user to change the time zone.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seundockprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seundockprivilege privilege is enabled, it allows the user of a portable computer to undock the computer by clicking Eject PC on the Start menu.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seunsolicitedinputprivilege" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If the seunsolicitedinputprivilege privilege is enabled, it allows the user to read unsolicited data from a terminal device.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sebatchlogonright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned the sebatchlogonright right, it can log on using the batch logon type.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seinteractivelogonright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned the seinteractivelogonright right, it can log on using the interactive logon type.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="senetworklogonright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned the senetworklogonright right, it can log on using the network logon type.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seremoteinteractivelogonright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned the seremoteinteractivelogonright right, it can log on to the computer by using a Remote Desktop connection.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="seservicelogonright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned the seservicelogonright right, it can log on using the service logon type.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sedenybatchLogonright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned the sedenybatchLogonright right, it is explicitly denied the ability to log on using the batch logon type.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sedenyinteractivelogonright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned the sedenyinteractivelogonright right, it is explicitly denied the ability to log on using the interactive logon type.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sedenynetworklogonright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned the sedenynetworklogonright right, it is explicitly denied the ability to log on using the network logon type.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sedenyremoteInteractivelogonright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned the sedenyremoteInteractivelogonright right, it is explicitly denied the ability to log on through Terminal Services.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sedenyservicelogonright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned the sedenyservicelogonright right, it is explicitly denied the ability to log on using the service logon type.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="setrustedcredmanaccessnameright" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>If an account is assigned this right, it can access the Credential Manager as a trusted caller.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="AccesstokenBehaviors"> <xsd:annotation> <xsd:documentation>The AccesstokenBehaviors complex type defines a number of behaviors that allow a more detailed definition of the accesstoken_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>Replaced by the userrights_test. The AccesstokenBehaviors complex type is used by the accesstoken_test which suffers from scalability issues when run on a domain controller and should not be used. As a result, the AccesstokenBehaviors complex type is no longer needed. See the userrights_test.</oval:reason> <oval:comment>This complex type has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> </xsd:appinfo> </xsd:annotation> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>If a group security principle is specified, this behavior specifies whether to include the group or not. For example, maybe you want to check the access tokens associated with every user within a group, but not the group itself. In this case, you would set the include_group behavior to 'false'. If the security_principle is not a group, then this behavior should be ignored.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_at_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:accesstoken_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:accesstoken_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved and any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>The 'resolve_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_object or similar to resolve the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_at_resolve_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:accesstoken_object/win-def:behaviors"> <sch:report test="@resolve_group">DEPRECATED BEHAVIOR IN: win-def:accesstoken_object </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:complexType> <!-- =============================================================================== --> <!-- =========================== ACTIVE DIRECTORY TEST =========================== --> <!-- =============================================================================== --> <xsd:element name="activedirectory_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The active directory test is used to check information about specific entries in active directory. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references an activedirectory_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:documentation>Note that this test supports only simple (string based) value collection. For more complex values see the activedirectory57_test.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>activedirectory_test</oval:test> <oval:object>activedirectory_object</oval:object> <oval:state>activedirectory_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">activedirectory_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_adtst"> <sch:rule context="win-def:activedirectory_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:activedirectory_object/@id"><sch:value-of select="../@id"/> - the object child element of an activedirectory_test must reference an activedirectory_object</sch:assert> </sch:rule> <sch:rule context="win-def:activedirectory_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:activedirectory_state/@id"><sch:value-of select="../@id"/> - the state child element of an activedirectory_test must reference an activedirectory_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="activedirectory_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The activedirectory_object element is used by an active directory test to define those objects to evaluated based on a specified state. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>An active directory object consists of three pieces of information, a naming context, a relative distinguished name, and an attribute. Each piece helps identify a specific active directory entry.</xsd:documentation> <xsd:documentation>Note that this object is paired with a state that supports only simple (string based) value collection. For more complex values see the activedirectory57_object.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="naming_context" type="win-def:EntityObjectNamingContextType"> <xsd:annotation> <xsd:documentation>Each object in active directory exists under a certain naming context (also known as a partition). A naming context is defined as a single object in the Directory Information Tree (DIT) along with every object in the tree subordinate to it. There are three default naming contexts in Active Directory: domain, configuration, and schema.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="relative_dn" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The relative_dn field is used to uniquely identify an object inside the specified naming context. It contains all the parts of the object's distinguished name except those outlined by the naming context. If the xsi:nil attribute is set to true, then the object being specified is the higher level naming context. In this case, the relative_dn element should not be collected or used in analysis. Setting xsi:nil equal to true is different than using a .* pattern match, which says to collect every relative dn under a given naming context.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="attribute" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>Specifies a named value contained by the object. If the xsi:nil attribute is set to true, the attribute element should not be collected or used in analysis. Setting xsi:nil equal to true is different than using a .* pattern match, which says to collect every attribute under a given relative dn.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="activedirectory_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The activedirectory_state element defines the different information that can be used to evaluate the specified entries in active directory. An active directory test will reference a specific instance of this state that defines the exact settings that need to be evaluated. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:documentation>Note that this state supports only simple (string based) value collection. For more complex values see the activedirectory57_state.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="naming_context" type="win-def:EntityStateNamingContextType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Each object in active directory exists under a certain naming context (also known as a partition). A naming context is defined as a single object in the Directory Information Tree (DIT) along with every object in the tree subordinate to it. There are three default naming contexts in Active Directory: domain, configuration, and schema.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="relative_dn" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The relative_dn field is used to uniquely identify an object inside the specified naming context. It contains all the parts of the objects distinguished name except those outlined by the naming context.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="attribute" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies a named value contained by the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="object_class" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The name of the class of which the object is an instance.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="adstype" type="win-def:EntityStateAdstypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies the type of information that the specified attribute represents.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="value" type="oval-def:EntityStateAnySimpleType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The actual value of the specified active directory attribute.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- =========================== ACTIVE DIRECTORY TEST (57) ====================== --> <!-- =============================================================================== --> <xsd:element name="activedirectory57_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The active directory test is used to check information about specific entries in active directory. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references an activedirectory57_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:documentation>Note that this test supports complex values that are in the form of a record. For simple (string based) value collection see the activedirectory_test.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>activedirectory57_test</oval:test> <oval:object>activedirectory57_object</oval:object> <oval:state>activedirectory57_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">activedirectory57_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_activedirectory57_test"> <sch:rule context="win-def:activedirectory57_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:activedirectory57_object/@id"><sch:value-of select="../@id"/> - the object child element of an activedirectory57_test must reference an activedirectory57_object</sch:assert> </sch:rule> <sch:rule context="win-def:activedirectory57_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:activedirectory57_state/@id"><sch:value-of select="../@id"/> - the state child element of an activedirectory57_test must reference an activedirectory57_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="activedirectory57_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The activedirectory57_object element is used by an active directory test to define those objects to evaluated based on a specified state. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>An active directory object consists of three pieces of information, a naming context, a relative distinguished name, and an attribute. Each piece helps identify a specific active directory entry.</xsd:documentation> <xsd:documentation>Note that this object supports complex values that are in the form of a record. For simple (string based) value collection see the activedirectory_object.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_activedirectory57_object_verify_filter_state"> <sch:rule context="win-def:activedirectory57_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:activedirectory57_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='activedirectory57_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="naming_context" type="win-def:EntityObjectNamingContextType"> <xsd:annotation> <xsd:documentation>Each object in active directory exists under a certain naming context (also known as a partition). A naming context is defined as a single object in the Directory Information Tree (DIT) along with every object in the tree subordinate to it. There are three default naming contexts in Active Directory: domain, configuration, and schema.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="relative_dn" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The relative_dn field is used to uniquely identify an object inside the specified naming context. It contains all the parts of the object's distinguished name except those outlined by the naming context. If the xsi:nil attribute is set to true, then the object being specified is the higher level naming context. In this case, the relative_dn element should not be collected or used in analysis. Setting xsi:nil equal to true is different than using a .* pattern match, which says to collect every relative dn under a given naming context.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="attribute" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>Specifies a named value contained by the object. If the xsi:nil attribute is set to true, the attribute element should not be collected or used in analysis. Setting xsi:nil equal to true is different than using a .* pattern match, which says to collect every attribute under a given relative dn.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="activedirectory57_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The activedirectory57_state element defines the different information that can be used to evaluate the specified entries in active directory. An active directory test will reference a specific instance of this state that defines the exact settings that need to be evaluated. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:documentation>Note that this state supports complex values that are in the form of a record. For simple (string based) value collection see the activedirectory_state.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="naming_context" type="win-def:EntityStateNamingContextType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Each object in active directory exists under a certain naming context (also known as a partition). A naming context is defined as a single object in the Directory Information Tree (DIT) along with every object in the tree subordinate to it. There are three default naming contexts in Active Directory: domain, configuration, and schema.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="relative_dn" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The relative_dn field is used to uniquely identify an object inside the specified naming context. It contains all the parts of the object's distinguished name except those outlined by the naming context.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="attribute" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies a named value contained by the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="object_class" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The name of the class of which the object is an instance.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="adstype" type="win-def:EntityStateAdstypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The type of information that the specified attribute represents.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="value" type="oval-def:EntityStateRecordType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The actual value of the specified Active Directory attribute. Note that while an Active Directory attribute can contain structured data where it is necessary to collect multiple related fields that can be described by the 'record' datatype, it is not always the case. It also is possible that an Active Directory attribute can contain only a single value or an array of values. In these cases, there is not a name to uniquely identify the corresponding field which is a requirement for fields in the 'record' datatype. As a result, the name of the Active Directory attribute will be used to uniquely identify the field and satisfy this requirement.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_ad57stevalue"> <sch:rule context="win-def:activedirectory57_state/win-def:value"> <sch:assert test="@datatype='record'"><sch:value-of select="../@id"/> - datatype attribute for the value entity of a activedirectory57_state must be 'record'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:unique name="UniqueAdValueFieldName"> <xsd:selector xpath="./oval-def:field"/> <xsd:field xpath="@name"/> </xsd:unique> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ========================== AUDIT EVENT POLICY TEST ========================== --> <!-- =============================================================================== --> <xsd:element name="auditeventpolicy_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The auditeventpolicy_test is used to check different types of events the system should audit. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a auditeventpolicy_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>auditeventpolicy_test</oval:test> <oval:object>auditeventpolicy_object</oval:object> <oval:state>auditeventpolicy_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">auditeventpolicy_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_aeptst"> <sch:rule context="win-def:auditeventpolicy_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:auditeventpolicy_object/@id"><sch:value-of select="../@id"/> - the object child element of an auditeventpolicy_test must reference an auditeventpolicy_object</sch:assert> </sch:rule> <sch:rule context="win-def:auditeventpolicy_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:auditeventpolicy_state/@id"><sch:value-of select="../@id"/> - the state child element of an auditeventpolicy_test must reference an auditeventpolicy_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="auditeventpolicy_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The auditeventpolicy_object element is used by an audit event policy test to define those objects to evaluate based on a specified state. There is actually only one object relating to audit event policy and this is the system as a whole. Therefore, there are no child entities defined. Any OVAL Test written to check audit event policy will reference the same auditeventpolicy_object which is basically an empty object element.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"/> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="auditeventpolicy_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The auditeventpolicy_state element specifies the different system activities that can be audited. An audit event policy test will reference a specific instance of this state that defines the exact settings that need to be evaluated. The defined values are found in window's POLICY_AUDIT_EVENT_TYPE enumeration and accessed through the LsaQueryInformationPolicy when the InformationClass parameters are set to PolicyAuditEventsInformation. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="account_logon" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit attempts to log on to or log off of the system. Also, audit attempts to make a network connection.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="account_management" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit attempts to create, delete, or change user or group accounts. Also, audit password changes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="detailed_tracking" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit specific events, such as program activation, some forms of handle duplication, indirect access to an object, and process exit. Note that this activitiy is also known as process tracking.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="directory_service_access" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit attempts to access the directory service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="logon" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit attempts to log on to or log off of the system. Also, audit attempts to make a network connection.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="object_access" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit attempts to access securable objects, such as files.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="policy_change" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit attempts to change Policy object rules. </xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="privilege_use" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit attempts to use privileges.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="system" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit attempts to shut down or restart the computer. Also, audit events that affect system security or the security log.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- =================== AUDIT EVENT POLICY SUBCATEGORIES TEST =================== --> <!-- =============================================================================== --> <xsd:element name="auditeventpolicysubcategories_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The auditeventpolicysubcategories_test is used to check the audit event policy settings on a Windows system. These settings are used to specify which system and network events are monitored. For example, if the credential_validation element has a value of AUDIT_FAILURE, it means that the system is configured to log all unsuccessful attempts to validate a user account on a system. It is important to note that these audit event policy settings are specific to certain versions of Windows. As a result, the documentation for that version of Windows should be consulted for more information on each setting. The test extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a auditeventpolicy_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>auditeventpolicysubcategories_test</oval:test> <oval:object>auditeventpolicysubcategories_object</oval:object> <oval:state>auditeventpolicysubcategories_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">auditeventpolicysubcategories_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_aepstst"> <sch:rule context="win-def:auditeventpolicysubcategories_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:auditeventpolicysubcategories_object/@id"><sch:value-of select="../@id"/> - the object child element of an auditeventpolicysubcategories_test must reference an auditeventpolicysubcategories_object</sch:assert> </sch:rule> <sch:rule context="win-def:auditeventpolicysubcategories_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:auditeventpolicysubcategories_state/@id"><sch:value-of select="../@id"/> - the state child element of an auditeventpolicysubcategories_test must reference an auditeventpolicysubcategories_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="auditeventpolicysubcategories_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The auditeventpolicysubcategories_object element is used by an audit event policy subcategories test to define those objects to evaluate based on a specified state. There is actually only one object relating to audit event policy subcategories and this is the system as a whole. Therefore, there are no child entities defined. Any OVAL Test written to check audit event policy subcategories will reference the same auditeventpolicysubcategories_object which is basically an empty object element.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"/> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="auditeventpolicysubcategories_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The auditeventpolicysubcategories_state element specifies the different system activities that can be audited. An audit event policy subcategories test will reference a specific instance of this state that defines the exact subcategories that need to be evaluated. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <!-- Account Logon Audit Policy Subcategories --> <xsd:element name="credential_validation" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced during the validation of a user's logon credentials. This state corresponds with the following GUID specified in ntsecapi.h: 0cce923f-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Account Logon: Audit Credential Validation</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="kerberos_authentication_service" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by Kerberos authentication ticket-granting requests. This state corresponds with the following GUID specified in ntsecapi.h: 0CCE9242-69AE-11D9-BED3-505054503030. This state corresponds with the following Advanced Audit Policy: Account Logon: Audit Kerboros Authentication Service</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="kerberos_service_ticket_operations" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by Kerberos service ticket requests. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9240-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Account Logon: Audit Kerberos Service Ticket Operations</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="kerberos_ticket_events" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced during the validation of Kerberos tickets provided for a user account logon request.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>This entity does not map to any known audit event policy subcategory.</oval:reason> <oval:comment>This entity has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_auditeventpolicysubcategoriesstatekerberos_ticket_events"> <sch:rule context="win-def:auditeventpolicysubcategories_state/win-def:kerberos_ticket_events"> <sch:report test="true()">DEPRECATED ELEMENT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="other_account_logon_events" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes to user accounts that are not covered by other events in the Account Logon category. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9241-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Account Logon: Audit Other Account Logon Events</xsd:documentation> </xsd:annotation> </xsd:element> <!-- Account Management Audit Policy Subcategories --> <xsd:element name="application_group_management" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes to application groups. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9239-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Account Management: Audit Application Group Management</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="computer_account_management" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes to computer accounts. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9236-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Account Management: Audit Computer Account Management</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="distribution_group_management" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes to distribution groups. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9238-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Account Management: Audit Distribution Account Management</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="other_account_management_events" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by other user account changes that are not covered by other events in the Account Management category. This state corresponds with the following GUID specified in ntsecapi.h: 0cce923a-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Account Management: Audit Other Account Management Events</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="security_group_management" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes to security groups. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9237-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Account Management: Audit Security Group Management</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="user_account_management" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes to user accounts. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9235-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Account Management: Audit User Account Management</xsd:documentation> </xsd:annotation> </xsd:element> <!-- Detailed Tracking Audit Policy Subcategories --> <xsd:element name="dpapi_activity" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced when requests are made to the Data Protection application interface. This state corresponds with the following GUID specified in ntsecapi.h: 0cce922d-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Detailed Tracking: Audit DPAPI Activity</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="process_creation" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced when a process is created or starts. This state corresponds with the following GUID specified in ntsecapi.h: 0cce922b-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Detailed Tracking: Audit Process Creation</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="process_termination" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced when a process ends. This state corresponds with the following GUID specified in ntsecapi.h: 0cce922c-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Detailed Tracking: Audit Process Termination</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="rpc_events" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by inbound remote procedure call connections. This state corresponds with the following GUID specified in ntsecapi.h: 0cce922e-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Detailed Tracking: Audit RPC Events</xsd:documentation> </xsd:annotation> </xsd:element> <!-- DS Access Audit Policy Subcategories --> <xsd:element name="directory_service_access" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced when a Active Directory Domain Services object is accessed. This state corresponds with the following GUID specified in ntsecapi.h: 0cce923b-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: DS Access: Audit Directory Service Access</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="directory_service_changes" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced when changes are made to Active Directory Domain Services objects. This state corresponds with the following GUID specified in ntsecapi.h: 0cce923c-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: DS Access: Audit Directory Service Changes</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="directory_service_replication" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced when two Active Directory Domain Services domain controllers are replicated. This state corresponds with the following GUID specified in ntsecapi.h: 0cce923d-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: DS Access: Audit Directory Service Access</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="detailed_directory_service_replication" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by detailed Active Directory Domain Services replication between domain controllers. This state corresponds with the following GUID specified in ntsecapi.h: 0cce923e-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: DS Access: Audit Detailed Directory Service Replication</xsd:documentation> </xsd:annotation> </xsd:element> <!-- Logon/Logoff Audit Policy Subcategories --> <xsd:element name="account_lockout" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by a failed attempt to log onto a locked out account. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9217-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Logon/Logoff: Audit Account Lockout</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="ipsec_extended_mode" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by Internet Key Exchange and Authenticated Internet protocol during Extended Mode negotiations. This state corresponds with the following GUID specified in ntsecapi.h: 0cce921a-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Logon/Logoff: Audit IPsec Extended Mode</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="ipsec_main_mode" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by Internet Key Exchange and Authenticated Internet protocol during Main Mode negotiations. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9218-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Logof/Logoff: Audit IPsec Main Mode</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="ipsec_quick_mode" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by Internet Key Exchange and Authenticated Internet protocol during Quick Mode negotiations. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9219-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Logon/Logoff: Audit IPsec Quick Mode</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="logoff" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by closing a logon session. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9216-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Logon/Logoff: Audit Logoff</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="logon" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by attempts to log onto a user account. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9215-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Logon/Logoff: Audit Logon</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="network_policy_server" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by RADIUS and Network Access Protection user access requests. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9243-69ae-11d9-bed3-505054503030.This state corresponds with the following Advanced Audit Policy: Logon/Logoff: Audit Network Policy Server</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="other_logon_logoff_events" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by other logon/logoff based events that are not covered in the Logon/Logoff category. This state corresponds with the following GUID specified in ntsecapi.h: 0cce921c-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Logon/Logoff: Audit Other Logon/Logoff Events</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="special_logon" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by special logons. This state corresponds with the following GUID specified in ntsecapi.h: 0cce921b-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Logon/Logoff: Audit Special Logon</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="logon_claims" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit user and device claims information in the user's logon token. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9247-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Logon/Logoff: Audit User / Device Claims</xsd:documentation> </xsd:annotation> </xsd:element> <!-- Object Access Audit Policy Subcategories --> <xsd:element name="application_generated" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by applications that use the Windows Auditing API. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9222-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Audit Application Generated</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="certification_services" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by operations on Active Directory Certificate Services. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9221-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Audit Certification Services</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="detailed_file_share" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by attempts to access files and folders on a shared folder. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9244-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Audit Detailed File Share</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_share" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by attempts to access a shared folder. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9224-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Audit File Share</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_system" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced user attempts to access file system objects. This state corresponds with the following GUID specified in ntsecapi.h: 0cce921d-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Audit File System</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filtering_platform_connection" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by connections that are allowed or blocked by Windows Filtering Platform. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9226-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Audit Filtering Platform Connection</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filtering_platform_packet_drop" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by packets that are dropped by Windows Filtering Platform. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9225-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Audit Filtering Platform Packet Drop</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="handle_manipulation" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced when a handle is opened or closed. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9223-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Handle Manipulation</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="kernel_object" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by attempts to access the system kernel. This state corresponds with the following GUID specified in ntsecapi.h: 0cce921f-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Kernel Object</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="other_object_access_events" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by the management of Task Scheduler jobs or COM+ objects. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9227-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Other Object Access Events</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="registry" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by attempts to access registry objects. This state corresponds with the following GUID specified in ntsecapi.h: 0cce921e-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Audit Registry</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sam" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by attempts to access Security Accounts Manager objects. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9220-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Audit SAM</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="removable_storage" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit events that indicate file object access attemps to removable storage. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9245-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Audit Removable Storage</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="central_access_policy_staging" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit events that indicate permission granted or denied by a proposed policy differs from the current central access policy on an object. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9246-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Object Access: Central Access Policy Staging</xsd:documentation> </xsd:annotation> </xsd:element> <!-- Policy Change Audit Policy Subcategories --> <xsd:element name="audit_policy_change" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes in security audit policy settings. This state corresponds with the following GUID specified in ntsecapi.h: 0cce922f-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Policy Change: Audit Audit Policy Change</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="authentication_policy_change" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes to the authentication policy. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9230-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Policy Change: Audit Authentication Policy Change</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="authorization_policy_change" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes to the authorization policy. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9231-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Policy Change: Audit Authorization Policy Change</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filtering_platform_policy_change" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes to the Windows Filtering Platform. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9233-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Policy Change: Audit Filtering Platform Policy Change</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="mpssvc_rule_level_policy_change" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes to policy rules used by the Windows Firewall. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9232-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Policy Change: Audit MPSSVC Rule-Level Policy Change</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="other_policy_change_events" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by other security policy changes that are not covered other events in the Policy Change category. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9234-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Policy Change: Audit Other Policy Change Events</xsd:documentation> </xsd:annotation> </xsd:element> <!-- Privilege Use Audit Policy Subcategories --> <xsd:element name="non_sensitive_privilege_use" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by the use of non-sensitive privileges. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9229-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Privilege Use: Audit Non Sensitive Privilege Use</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="other_privilege_use_events" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This is currently not used and has been reserved by Microsoft for use in the future. This state corresponds with the following GUID specified in ntsecapi.h: 0cce922a-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Privilege Use: Audit Other Privilege Use Events</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sensitive_privilege_use" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by the use of sensitive privileges. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9228-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: Privilege Use: Audit Sensitive Privilege Use</xsd:documentation> </xsd:annotation> </xsd:element> <!-- System Audit Policy Subcategories --> <xsd:element name="ipsec_driver" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by the IPsec filter driver. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9213-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: System: Audit IPsec Driver</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="other_system_events" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by the startup and shutdown, security policy processing, and cryptography key file and migration operations of the Windows Firewall. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9214-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: System: Audit Other System Events</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="security_state_change" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by changes in the security state. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9210-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: System: Audit Security State Change</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="security_system_extension" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events produced by the security system extensions or services. This state corresponds with the following GUID specified in ntsecapi.h: cce9211-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: System: Audit Security System Extension</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="system_integrity" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Audit the events that indicate that the integrity security subsystem has been violated. This state corresponds with the following GUID specified in ntsecapi.h: 0cce9212-69ae-11d9-bed3-505054503030. This state corresponds with the following Advanced Audit Policy: System: Audit System Integrity</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ================================== CMDLET TEST ============================== --> <!-- =============================================================================== --> <xsd:element name="cmdlet_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The cmdlet_test is used to levarage a PowerShell cmdlet to check a Windows system. The test extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a cmdlet_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>cmdlet_test</oval:test> <oval:object>cmdlet_object</oval:object> <oval:state>cmdlet_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">cmdlet_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_cmdlet_test"> <sch:rule context="win-def:cmdlet_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:cmdlet_object/@id"><sch:value-of select="../@id"/> - the object child element of a cmdlet_test must reference a cmdlet_object</sch:assert> </sch:rule> <sch:rule context="win-def:cmdlet_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:cmdlet_state/@id"><sch:value-of select="../@id"/> - the state child element of a cmdlet_test must reference a cmdlet_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="cmdlet_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The cmdlet_object element is used by a cmdlet_test to identify the set of cmdlets to use and the parameters to provide to them for checking the state of a system. In order to ensure the consistency of PowerShell cmdlet support among OVAL interpreters as well as ensure that the state of a system is not changed, every OVAL interpreter must implement the following requirements. An OVAL interpreter must only support the processing of the verbs specified in the EntityObjectCmdletVerbType. If a cmdlet verb that is not defined in this enumeration is discovered, an error should be reported and the cmdlet must not be executed on the system. While XML Schema validation will enforce this requirement, it is strongly recommended that OVAL interpreters implement a whitelist of allowed cmdlets. This can be done using constrained runspaces which can limit the PowerShell execution environment. For more information, please see Microsoft's documentation on Windows PowerShell Host Application Concepts. Furthermore, it is strongly recommended that OVAL interpreters also implement PowerShell support with the NoLanguage mode enabled. The NoLanguage mode ensures that scripts that need to be evaluated are not allowed in the runspace. For more information about the NoLanguage mode, please see Microsoft's documentation on the PSLanguageMode enumeration.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdlet_object_verify_filter_state"> <sch:rule context="win-def:cmdlet_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:cmdlet_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='cmdlet_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="module_name" type="oval-def:EntityObjectStringType" nillable="true" minOccurs="1" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The name of the module that contains the cmdlet.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdletobjmodule_name"> <sch:rule context="win-def:cmdlet_object/win-def:module_name"> <sch:assert test="not(@operation) or @operation='equals'"><sch:value-of select="../@id"/> - operation attribute for the module_name entity of a cmdlet_object must be 'equals'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="module_id" type="win-def:EntityObjectGUIDType" nillable="true" minOccurs="1" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The globally unique identifier for the module.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdletobjmodule_id"> <sch:rule context="win-def:cmdlet_object/win-def:module_id"> <sch:assert test="not(@operation) or @operation='equals'"><sch:value-of select="../@id"/> - operation attribute for the module_id entity of a cmdlet_object must be 'equals'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="module_version" type="oval-def:EntityObjectVersionType" nillable="true" minOccurs="1" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The version of the module that contains the cmdlet in the form of MAJOR.MINOR.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdletobjmodule_version"> <sch:rule context="win-def:cmdlet_object/win-def:module_version"> <sch:assert test="not(@operation) or @operation='equals'"><sch:value-of select="../@id"/> - operation attribute for the module_version entity of a cmdlet_object must be 'equals'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="verb" type="win-def:EntityObjectCmdletVerbType" minOccurs="1" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The cmdlet verb.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdletobjverb"> <sch:rule context="win-def:cmdlet_object/win-def:verb"> <sch:assert test="not(@operation) or @operation='equals'"><sch:value-of select="../@id"/> - operation attribute for the verb entity of a cmdlet_object must be 'equals'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="noun" type="oval-def:EntityObjectStringType" minOccurs="1" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The cmdlet noun.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdletobjnoun"> <sch:rule context="win-def:cmdlet_object/win-def:noun"> <sch:assert test="not(@operation) or @operation='equals'"><sch:value-of select="../@id"/> - operation attribute for the noun entity of a cmdlet_object must be 'equals'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="parameters" type="oval-def:EntityObjectRecordType" nillable="true"> <xsd:annotation> <xsd:documentation>A list of properties (name and value pairs) as input to invoke the cmdlet. Each property name must be unique. When xsi:nill is set to true, parameters are not provided to the cmdlet.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdletobjparameters"> <sch:rule context="win-def:cmdlet_object/win-def:parameters"> <sch:assert test="@datatype='record'"><sch:value-of select="../@id"/> - datatype attribute for the parameters entity of a cmdlet_object must be 'record'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:unique name="UniqueCmdletObjParametersFieldName"> <xsd:selector xpath="./oval-def:field"/> <xsd:field xpath="@name"/> </xsd:unique> </xsd:element> <xsd:element name="select" type="oval-def:EntityObjectRecordType" nillable="true"> <xsd:annotation> <xsd:documentation>A list of fields (name and value pairs) used as input to the Select-Object cmdlet to select specific output properties. Each property name must be unique. Please note that the use of the '*' character, to select all properties, is not permitted. This is because the value record entity, in the state and item, require unique field name values to ensure that any query results can be evaluated consistently. This is equivalent to piping the output of a cmdlet to the Select-Object cmdlet. When xsi:nill is set to true, the Select-Object is not used.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdletobjselect"> <sch:rule context="win-def:cmdlet_object/win-def:select"> <sch:assert test="@datatype='record'"><sch:value-of select="../@id"/> - datatype attribute for the select entity of a cmdlet_object must be 'record'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:unique name="UniqueCmdletObjSelectFieldName"> <xsd:selector xpath="./oval-def:field"/> <xsd:field xpath="@name"/> </xsd:unique> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="cmdlet_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The cmdlet_state allows for assertions about the presence of PowerShell cmdlet related properties and values obtained from a cmdlet.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="module_name" type="oval-def:EntityStateStringType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The name of the module that contains the cmdlet.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="module_id" type="win-def:EntityStateGUIDType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The globally unique identifier for the module.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="module_version" type="oval-def:EntityStateVersionType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The version of the module that contains the cmdlet in the form of MAJOR.MINOR.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="verb" type="win-def:EntityStateCmdletVerbType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The cmdlet verb.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="noun" type="oval-def:EntityStateStringType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The cmdlet noun.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="parameters" type="oval-def:EntityStateRecordType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>A list of properties (name and value pairs) as input to invoke the cmdlet. Each property name must be unique.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdletsteparameters"> <sch:rule context="win-def:cmdlet_state/win-def:parameters"> <sch:assert test="@datatype='record'"><sch:value-of select="../@id"/> - datatype attribute for the parameters entity of a cmdlet_state must be 'record'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:unique name="UniqueCmdletSteParametersFieldName"> <xsd:selector xpath="./oval-def:field"/> <xsd:field xpath="@name"/> </xsd:unique> </xsd:element> <xsd:element name="select" type="oval-def:EntityStateRecordType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>A list of fields (name and value pairs) used as input to the Select-Object cmdlet to select specific output properties. Each property name must be unique.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdletsteselect"> <sch:rule context="win-def:cmdlet_state/win-def:select"> <sch:assert test="@datatype='record'"><sch:value-of select="../@id"/> - datatype attribute for the select entity of a cmdlet_state must be 'record'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:unique name="UniqueCmdletSteSelectFieldName"> <xsd:selector xpath="./oval-def:field"/> <xsd:field xpath="@name"/> </xsd:unique> </xsd:element> <xsd:element name="value" type="oval-def:EntityStateRecordType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The expected value represented as a set of fields (name and value pairs). Each field must be have a unique name.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_cmdletstevalue"> <sch:rule context="win-def:cmdlet_state/win-def:value"> <sch:assert test="@datatype='record'"><sch:value-of select="../@id"/> - datatype attribute for the value entity of a cmdlet_state must be 'record'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:unique name="UniqueCmdletValueFieldName"> <xsd:selector xpath="./oval-def:field"/> <xsd:field xpath="@name"/> </xsd:unique> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- =============================== DNS CACHE TEST ============================== --> <!-- =============================================================================== --> <xsd:element name="dnscache_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The dnscache_test is used to check the time to live and IP addresses associated with a domain name. The time to live and IP addresses for a particular domain name are retrieved from the DNS cache on the local system. The entries in the DNS cache can be collected using Microsoft's DnsGetCacheDataTable() and DnsQuery() API calls. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a dnscache_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>dnscache_test</oval:test> <oval:object>dnscache_object</oval:object> <oval:state>dnscache_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">dnscache_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_dnscachetst"> <sch:rule context="win-def:dnscache_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:dnscache_object/@id"><sch:value-of select="../@id"/> - the object child element of a dnscache_test must reference a dnscache_object</sch:assert> </sch:rule> <sch:rule context="win-def:dnscache_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:dnscache_state/@id"><sch:value-of select="../@id"/> - the state child element of a dnscache_test must reference a dnscache_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="dnscache_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The dnscache_object is used by the dnscache_test to specify the domain name(s) that should be collected from the DNS cache on the local system. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_dnscache_object_verify_filter_state"> <sch:rule context="win-def:dnscache_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:dnscache_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='dnscache_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="domain_name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The domain_name element specifies the domain name(s) that should be collected from the DNS cache on the local system.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="dnscache_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The dnscache_state contains three entities that are used to check the domain name, time to live, and IP addresses associated with the DNS cache entry.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="domain_name" type="oval-def:EntityStateStringType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The domain_name element contains a string that represents a domain name that was collected from the DNS cache on the local system.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="ttl" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The ttl element contains an integer that represents the time to live in seconds of the DNS cache entry.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="ip_address" type="oval-def:EntityStateIPAddressStringType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The ip_address element contains a string that represents an IP address associated with the specified domain name that was collected from the DNS cache on the local system. Note that the IP address can be IPv4 or IPv6.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ================================= FILE TEST ================================= --> <!-- =============================================================================== --> <xsd:element name="file_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The file test is used to check metadata associated with Windows files. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a file_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>file_test</oval:test> <oval:object>file_object</oval:object> <oval:state>file_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">file_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_filetst"> <sch:rule context="win-def:file_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:file_object/@id"><sch:value-of select="../@id"/> - the object child element of a file_test must reference a file_object</sch:assert> </sch:rule> <sch:rule context="win-def:file_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:file_state/@id"><sch:value-of select="../@id"/> - the state child element of a file_test must reference a file_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="file_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The file_object element is used by a file test to define the specific file(s) to be evaluated. The file_object will collect directories and all Windows file types (FILE_TYPE_CHAR, FILE_TYPE_DISK, FILE_TYPE_PIPE, FILE_TYPE_REMOTE, and FILE_TYPE_UNKNOWN). Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>A file object defines the path and filename or complete filepath of the file(s). In addition, a number of behaviors may be provided that help guide the collection of objects. Please refer to the FileBehaviors complex type for more information about specific behaviors.</xsd:documentation> <xsd:documentation>The set of files to be evaluated may be identified with either a complete filepath or a path and filename. Only one of these options may be selected.</xsd:documentation> <xsd:documentation>It is important to note that the 'max_depth' and 'recurse_direction' attributes of the 'behaviors' element do not apply to the 'filepath' element, only to the 'path' and 'filename' elements. This is because the 'filepath' element represents an absolute path to a particular file and it is not possible to recurse over a file.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_file_object_verify_filter_state"> <sch:rule context="win-def:file_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:file_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='file_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:FileBehaviors" minOccurs="0"/> <xsd:choice> <xsd:element name="filepath" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The filepath element specifies the absolute path for a file on the machine. A directory cannot be specified as a filepath.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fileobjfilepath"> <sch:rule context="win-def:file_object/win-def:filepath"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth or @recurse_direction])"><sch:value-of select="../@id"/> - the max_depth and recurse_direction behaviors are not allowed with a filepath entity</sch:assert> </sch:rule> </sch:pattern> <sch:pattern id="win-def_fileobjfilepath2"> <sch:rule context="win-def:file_object/win-def:filepath[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_file_system='defined'])"><sch:value-of select="../@id"/> - the recurse_file_system behavior MUST not be set to 'defined' when a pattern match is used with a filepath entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:sequence> <xsd:element name="path" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a file on the machine.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fileobjpath"> <sch:rule context="win-def:file_object/win-def:path[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_file_system='defined'])"><sch:value-of select="../@id"/> - the recurse_file_system behavior MUST not be set to 'defined' when a pattern match is used with a path entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth])"><sch:value-of select="../@id"/> - the max_depth behavior MUST not be used when a pattern match is used with a path entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_direction])"><sch:value-of select="../@id"/> - the recurse_direction behavior MUST not be used when a pattern match is used with a path entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of a file to evaluate. If the xsi:nil attribute is set to true, then the object being specified is the higher level directory object (not all the files in the directory). In this case, the filename element should not be used during collection and would result in the unique set of items being the directories themselves. For example, one would set xsi:nil to true if the desire was to test the attributes or permissions associated with a directory. Setting xsi:nil equal to true is different than using a .* pattern match, which says to collect every file under a given path.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fileobjfilename"> <sch:rule context="win-def:file_object/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> <sch:assert test="(@var_ref and .='') or ((@xsi:nil='1' or @xsi:nil='true') and .='') or not(@var_ref)"><sch:value-of select="../@id"/> - filename entity cannot be empty unless the xsi:nil attribute is set to true or a var_ref is used</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:choice> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="file_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The file_state element defines the different metadata associate with a Windows file. This includes the path, filename, owner, size, last modified time, version, etc. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="filepath" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The filepath element specifies the absolute path for a file on the machine. A directory cannot be specified as a filepath.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="path" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a file on the machine.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of the file.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_filestefilename"> <sch:rule context="win-def:file_state/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="owner" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The owner element is a string that contains the name of the owner. The name should be specified in the DOMAIN\username format.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The size element is the size of the file in bytes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="a_time" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Time of last access of file. Valid on NTFS but not on FAT formatted disk drives. The string should represent the FILETIME structure which is a 64-bit value representing the number of 100-nanosecond intervals since January 1, 1601 (UTC).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="c_time" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Time of creation of file. Valid on NTFS but not on FAT formatted disk drives. The string should represent the FILETIME structure which is a 64-bit value representing the number of 100-nanosecond intervals since January 1, 1601 (UTC).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="m_time" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Time of last modification of file. The string should represent the FILETIME structure which is a 64-bit value representing the number of 100-nanosecond intervals since January 1, 1601 (UTC).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="ms_checksum" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The checksum of the file as supplied by Microsoft's MapFileAndCheckSum function.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="version" type="oval-def:EntityStateVersionType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The version element is the delimited version string of the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="type" type="win-def:EntityStateFileTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The type element marks whether the file is a directory, named pipe, standard file, etc. These types are the return values for GetFileType, with the exception of FILE_ATTRIBUTE_DIRECTORY which is obtained by looking at GetFileAttributesEx. NOTE: Should this entity be split into two in future versions of the language as there are other values associated with GetFileAttributesEx that are not represented here?</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="development_class" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The development_class element allows the distinction to be made between the GDR development environment and the QFE development environment. This field holds the text found in front of the mmmmmm-nnnn version, for example srv03_gdr.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="company" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This entity defines a company name to be found within the version-information structure.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="internal_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This entity defines an internal name to be found within the version-information structure.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="language" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This entity defines a language to be found within the version-information structure.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="original_filename" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This entity defines an original filename to be found within the version-information structure.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="product_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This entity defines a product name to be found within the version-information structure.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="product_version" type="oval-def:EntityStateVersionType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This entity defines a product version to be found within the version-information structure.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="windows_view" type="win-def:EntityStateWindowsViewType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The windows view value to which this was targeted. This is used to indicate which view (32-bit or 64-bit), the associated State applies to.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="FileBehaviors"> <xsd:annotation> <xsd:documentation>The FileBehaviors complex type defines a number of behaviors that allow a more detailed definition of the file_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> <xsd:documentation>It is important to note that the 'max_depth' and 'recurse_direction' attributes of the 'behaviors' element do not apply to the 'filepath' element, only to the 'path' and 'filename' elements. This is because the 'filepath' element represents an absolute path to a particular file and it is not possible to recurse over a file.</xsd:documentation> </xsd:annotation> <xsd:attribute name="max_depth" use="optional" default="-1"> <xsd:annotation> <xsd:documentation>'max_depth' defines the maximum depth of recursion to perform when a recurse_direction is specified. A value of '0' is equivalent to no recursion, '1' means to step only one directory level up/down, and so on. The default value is '-1' meaning no limitation. For a 'max_depth' of -1 or any value of 1 or more the starting directory must be considered in the recursive search.</xsd:documentation> <xsd:documentation>Note that the default recurse_direction behavior is 'none' so even though max_depth specifies no limitation by default, the recurse_direction behavior turns recursion off.</xsd:documentation> <xsd:documentation>Note that this behavior only applies with the equality operation on the path entity.</xsd:documentation> </xsd:annotation> <xsd:simpleType> <xsd:restriction base="xsd:integer"> <xsd:fractionDigits value="0"/> <xsd:minInclusive value="-1"/> </xsd:restriction> </xsd:simpleType> </xsd:attribute> <xsd:attribute name="recurse_direction" use="optional" default="none"> <xsd:annotation> <xsd:documentation>'recurse_direction' defines the direction, either 'up' to parent directories, or 'down' into child directories to recursively search for files. When recursing up or down, one is limited by the max_depth behavior. Note that it is not an error if max_depth specifies a certain level of recursion and that level does not exist. Recursing should only go as deep as available. The default value is 'none' for no recursion.</xsd:documentation> <xsd:documentation>Note that this behavior only applies with the equality operation on the path entity.</xsd:documentation> </xsd:annotation> <xsd:simpleType> <xsd:restriction base="xsd:string"> <xsd:enumeration value="none"/> <xsd:enumeration value="up"/> <xsd:enumeration value="down"/> </xsd:restriction> </xsd:simpleType> </xsd:attribute> <xsd:attribute name="recurse_file_system" use="optional" default="all"> <xsd:annotation> <xsd:documentation>'recurse_file_system' defines the file system limitation of any searching and applies to all operations as specified on the path or filepath entity. The value of 'local' limits the search scope to local file systems (as opposed to file systems mounted from an external system). The value of 'defined' keeps any recursion within the file system that the file_object (path+filename or filepath) has specified. For example, if the path specified was "C:\", you would search only the C: drive, not other filesystems mounted to descendant paths. The value of 'defined' only applies when an equality operation is used for searching because the path or filepath entity must explicitly define a file system. The default value is 'all' meaning to search all available file systems for data collection.</xsd:documentation> <xsd:documentation>Note that in most cases it is recommended that the value of 'local' be used to ensure that file system searching is limited to only the local file systems. Searching 'all' file systems may have performance implications.</xsd:documentation> </xsd:annotation> <xsd:simpleType> <xsd:restriction base="xsd:string"> <xsd:enumeration value="all"/> <xsd:enumeration value="local"/> <xsd:enumeration value="defined"/> </xsd:restriction> </xsd:simpleType> </xsd:attribute> <xsd:attribute name="windows_view" use="optional" default="64_bit"> <xsd:annotation> <xsd:documentation>64-bit versions of Windows provide an alternate file system and registry views to 32-bit applications. This behavior allows the OVAL Object to state which view should be examined. This behavior only applies to 64-bit Windows, and must not be applied on other platforms. </xsd:documentation> <xsd:documentation>Note that the values have the following meaning: '64_bit' - Indicates that the 64-bit view on 64-bit Windows operating systems must be examined. On a 32-bit system, the Object must be evaluated without applying the behavior. '32_bit' - Indicates that the 32-bit view must be examined. On a 32-bit system, the Object must be evaluated without applying the behavior. It is recommended that the corresponding 'windows_view' entity be set on the OVAL Items that are collected when this behavior is used to distinguish between OVAL Items that were collected in the 32-bit or 64-bit views.</xsd:documentation> </xsd:annotation> <xsd:simpleType> <xsd:restriction base="xsd:string"> <xsd:enumeration value="32_bit"/> <xsd:enumeration value="64_bit"/> </xsd:restriction> </xsd:simpleType> </xsd:attribute> </xsd:complexType> <!-- =============================================================================== --> <!-- ==================== FILE AUDITED PERMISSIONS TEST (53) ===================== --> <!-- =============================================================================== --> <xsd:element name="fileauditedpermissions53_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The file audit permissions test is used to check the audit permissions associated with Windows files. Note that the trustee's audited permissions are the audit permissons that the SACL grants to the trustee or to any groups of which the trustee is a member. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a fileauditedpermissions_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>fileauditedpermissions53_test</oval:test> <oval:object>fileauditedpermissions53_object</oval:object> <oval:state>fileauditedpermissions53_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">fileauditedpermissions_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_fap53tst"> <sch:rule context="win-def:fileauditedpermissions53_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:fileauditedpermissions53_object/@id"><sch:value-of select="../@id"/> - the object child element of a fileauditedpermissions53_test must reference a fileauditedpermissions53_object</sch:assert> </sch:rule> <sch:rule context="win-def:fileauditedpermissions53_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:fileauditedpermissions53_state/@id"><sch:value-of select="../@id"/> - the state child element of a fileauditedpermissions53_test must reference a fileauditedpermissions53_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="fileauditedpermissions53_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The fileauditedpermissions53_object element is used by a file audited permissions test to define the objects used to evalutate against the specified state. The fileauditedpermissions53_object will collect directories and all Windows file types (FILE_TYPE_CHAR, FILE_TYPE_DISK, FILE_TYPE_PIPE, FILE_TYPE_REMOTE, and FILE_TYPE_UNKNOWN). Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic.</xsd:documentation> <xsd:documentation>A fileauditedpermissions53_object is defined as a combination of a Windows file and trustee SID. The file represents the file to be evaluated while the trustee SID represents the account (SID) to check audited permissions of. If multiple files or SIDs are matched by either reference, then each possible combination of file and SID is a matching file audited permissions object. In addition, a number of behaviors may be provided that help guide the collection of objects. Please refer to the FileAuditPermissions53Behaviors complex type for more information about specific behaviors.</xsd:documentation> <xsd:documentation>The set of files to be evaluated may be identified with either a complete filepath or a path and filename. Only one of these options may be selected.</xsd:documentation> <xsd:documentation>It is important to note that the 'max_depth' and 'recurse_direction' attributes of the 'behaviors' element do not apply to the 'filepath' element, only to the 'path' and 'filename' elements. This is because the 'filepath' element represents an absolute path to a particular file and it is not possible to recurse over a file.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fileauditedpermissions53_object_verify_filter_state"> <sch:rule context="win-def:fileauditedpermissions53_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:fileauditedpermissions53_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='fileauditedpermissions53_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:FileAuditPermissions53Behaviors" minOccurs="0"/> <xsd:choice> <xsd:element name="filepath" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The filepath element specifies the absolute path for a file on the machine. A directory cannot be specified as a filepath.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fap53objfilepath"> <sch:rule context="win-def:fileauditedpermissions53_object/win-def:filepath"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth or @recurse_direction])"><sch:value-of select="../@id"/> - the max_depth and recurse_direction behaviors are not allowed with a filepath entity</sch:assert> </sch:rule> </sch:pattern> <sch:pattern id="win-def_fap53objfilepath2"> <sch:rule context="win-def:fileauditedpermissions53_object/win-def:filepath[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_file_system='defined'])"><sch:value-of select="../@id"/> - the recurse_file_system behavior MUST not be set to 'defined' when a pattern match is used with a filepath entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:sequence> <xsd:element name="path" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a file on the machine.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fap53objpath"> <sch:rule context="win-def:fileauditedpermissions53_object/win-def:path[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_file_system='defined'])"><sch:value-of select="../@id"/> - the recurse_file_system behavior MUST not be set to 'defined' when a pattern match is used with a path entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth])"><sch:value-of select="../@id"/> - the max_depth behavior MUST not be used when a pattern match is used with a path entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_direction])"><sch:value-of select="../@id"/> - the recurse_direction behavior MUST not be used when a pattern match is used with a path entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of a file to evaluate. If the xsi:nil attribute is set to true, then the object being specified is the higher level directory object (not all the files in the directory). In this case, the filename element should not be used during collection and would result in the unique set of items being the directories themselves. For example, one would set xsi:nil to true if the desire was to test the attributes or permissions associated with a directory. Setting xsi:nil equal to true is different than using a .* pattern match, which says to collect every file under a given path.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fap53objfilename"> <sch:rule context="win-def:fileauditedpermissions53_object/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> <sch:assert test="(@var_ref and .='') or ((@xsi:nil='1' or @xsi:nil='true') and .='') or not(.='') or (.='' and @operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot be empty unless the xsi:nil attribute is set to true or a var_ref is used</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:choice> <xsd:element name="trustee_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_sid entity identifies a unique SID associated with a user, group, system, or program (such as a Windows service). If an operation other than equals is used to identify matching trustees (i.e. not equal, or a pattern match) then the resulting matches shall be limited to only the trustees referenced in the file's Security Descriptor. The scope is limited here to avoid unnecessarily resource intensive searches for trustees. Note that the larger scope of all known trustees may be obtained through the use of variables.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="fileauditedpermissions53_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The fileauditedpermissions53_state element defines the different audit permissions that can be associated with a given fileauditedpermissions53_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="filepath" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The filepath element specifies the absolute path for a file on the machine. A directory cannot be specified as a filepath.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="path" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a file on the machine.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of a file to test for.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fap53stefilename"> <sch:rule context="win-def:fileauditedpermissions53_state/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The trustee_sid element is the unique SID that associated a user, group, system, or program (such as a Windows service).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_data" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read data from the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_data" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to write data to the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_append_data" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to append data to the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_ea" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read extended attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_ea" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to write extended attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_execute" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to execute a file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_delete_child" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Right to delete a directory and all the files it contains (its children), even if the files are read-only.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_attributes" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read file attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_attributes" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to change file attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="windows_view" type="win-def:EntityStateWindowsViewType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The windows view value to which this was targeted. This is used to indicate which view (32-bit or 64-bit), the associated State applies to.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="FileAuditPermissions53Behaviors"> <xsd:annotation> <xsd:documentation>The FileAuditPermissions53Behaviors complex type defines a number of behaviors that allow a more detailed definition of the fileauditpermissions53_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> <xsd:documentation>It is important to note that the 'max_depth' and 'recurse_direction' attributes of the 'behaviors' element do not apply to the 'filepath' element, only to the 'path' and 'filename' elements. This is because the 'filepath' element represents an absolute path to a particular file and it is not possible to recurse over a file.</xsd:documentation> <xsd:documentation>The FileAuditPermissions53Behaviors extend the win-def:FileBehaviors and therefore include the behaviors defined by that type.</xsd:documentation> </xsd:annotation> <xsd:complexContent> <xsd:extension base="win-def:FileBehaviors"> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group SID should be included in the object when the object is defined by a group SID. For example, the intent of an object defined by a group SID might be to retrieve all the user SIDs that are a member of the group, but not the group SID itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_fap53_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:fileauditedpermissions53_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:fileauditedpermissions53_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>The 'resolve_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to resolve the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_fap53_resolve_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:fileauditedpermissions53_object/win-def:behaviors"> <sch:report test="@resolve_group">DEPRECATED BEHAVIOR IN: fileauditedpermissions53_object </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:extension> </xsd:complexContent> </xsd:complexType> <!-- =============================================================================== --> <!-- ================ FILE AUDITED PERMISSIONS TEST (deprecated) ================== --> <!-- =============================================================================== --> <xsd:element name="fileauditedpermissions_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The file audited permissions test is used to check the audit permissions associated with Windows files. Note that the trustee's audited permissions are the audit permissons that the SACL grants to the trustee or to any groups of which the trustee is a member. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a fileauditedpermissions_object, and the optional state element references a fileauditedpermissions_state that specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>fileauditedpermissions_test</oval:test> <oval:object>fileauditedpermissions_object</oval:object> <oval:state>fileauditedpermissions_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">fileauditedpermissions_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the fileauditedpermissions53_test. This test uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new test was created to use trustee SIDs, which are unique. See the fileauditedpermissions53_test.</oval:reason> <oval:comment>This test has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_faptst_dep"> <sch:rule context="win-def:fileauditedpermissions_test"> <sch:report test="true()">DEPRECATED TEST: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_faptst"> <sch:rule context="win-def:fileauditedpermissions_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:fileauditedpermissions_object/@id"><sch:value-of select="../@id"/> - the object child element of a fileauditedpermissions_test must reference a fileauditedpermissions_object</sch:assert> </sch:rule> <sch:rule context="win-def:fileauditedpermissions_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:fileauditedpermissions_state/@id"><sch:value-of select="../@id"/> - the state child element of a fileauditedpermissions_test must reference a fileauditedpermissions_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="fileauditedpermissions_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The fileauditedpermissions_object element is used by a file audited permissions test to define the objects used to evalutate against the specified state. The fileauditedpermissions_object will collect directories and all Windows file types (FILE_TYPE_CHAR, FILE_TYPE_DISK, FILE_TYPE_PIPE, FILE_TYPE_REMOTE, and FILE_TYPE_UNKNOWN). Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic.</xsd:documentation> <xsd:documentation>A fileauditedpermissions_object is defined as a combination of a Windows file and trustee name. The file represents the file to be evaluated while the trustee name represents the account (SID) to check audited permissions of. If multiple files or SIDs are matched by either reference, then each possible combination of file and SID is a matching file audited permissions object. In addition, a number of behaviors may be provided that help guide the collection of objects. Please refer to the FileAuditPermissionsBehaviors complex type for more information about specific behaviors.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the fileauditedpermissions53_object. This object uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new object was created to use trustee SIDs, which are unique. See the fileauditedpermissions53_object.</oval:reason> <oval:comment>This object has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_fapobj_dep"> <sch:rule context="win-def:fileauditedpermissions_object"> <sch:report test="true()">DEPRECATED OBJECT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:FileAuditPermissionsBehaviors" minOccurs="0"/> <xsd:element name="path" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a file on the machine.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of a file to evaluate. If the xsi:nil attribute is set to true, then the object being specified is the higher level directory object (not all the files in the directory). In this case, the filename element should not be used during collection and would result in the unique set of items being the directories themselves. For example, one would set xsi:nil to true if the desire was to test the attributes or permissions associated with a directory. Setting xsi:nil equal to true is different than using a .* pattern match, which says to collect every file under a given path.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fapobjfilename"> <sch:rule context="win-def:fileauditedpermissions_object/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> <sch:assert test="(@var_ref and .='') or ((@xsi:nil='1' or @xsi:nil='true') and .='') or not(.='') or (.='' and @operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot be empty unless the xsi:nil attribute is set to true or a var_ref is used</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="trustee_name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_name element is the unique name that associated a particular SID. A SID can be associated with a user, group, or program (such as a Windows service). In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="fileauditedpermissions_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The fileauditedpermissions_state element defines the different audit permissions that can be associated with a given fileauditedpermissions_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the fileauditedpermissions53_state. This state uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new state was created to use trustee SIDs, which are unique. See the fileauditedpermissions53_state.</oval:reason> <oval:comment>This state has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_fapste_dep"> <sch:rule context="win-def:fileauditedpermissions_state"> <sch:report test="true()">DEPRECATED STATE: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="path" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a file on the machine.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of a file to test for.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fapstefilename"> <sch:rule context="win-def:fileauditedpermissions_state/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="trustee_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The trustee_name is the unique name associated with a particular security identifier (SID). In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_data" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read data from the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_data" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to write data to the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_append_data" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to append data to the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_ea" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read extended attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_ea" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to write extended attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_execute" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to execute a file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_delete_child" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Right to delete a directory and all the files it contains (its children), even if the files are read-only.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_attributes" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read file attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_attributes" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to change file attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="windows_view" type="win-def:EntityStateWindowsViewType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The windows view value to which this was targeted. This is used to indicate which view (32-bit or 64-bit), the associated State applies to.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="FileAuditPermissionsBehaviors"> <xsd:annotation> <xsd:documentation>The FileAuditPermissionsBehaviors complex type defines a number of behaviors that allow a more detailed definition of the fileauditpermissions_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> <xsd:documentation>The FileAuditPermissionsBehaviors extend the win-def:FileBehaviors and therefore include the behaviors defined by that type.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the FileAuditPermissionsBehaviors53. The FileAuditPermissionsBehaviors complex type is used by the fileauditedpermissions_test which uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new test was created to use trustee SIDs, which are unique. This new test utilizes the FileAuditPermissionsBehaviors53 complex type, and as a result, the FileAuditPermissionsBehaviors complex type is no longer needed.</oval:reason> <oval:comment>This complex type has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> </xsd:appinfo> </xsd:annotation> <xsd:complexContent> <xsd:extension base="win-def:FileBehaviors"> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group trustee name should be included in the object when the object is defined by a group trustee name. For example, the intent of an object defined by a group trustee name might be to retrieve all the user SIDs that are a member of the group, but not the group trustee name itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_fap_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:fileauditedpermissions_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:fileauditedpermissions_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>The 'resolve_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_object or similar to resolve the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_fap_resolve_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:fileauditedpermissions_object/win-def:behaviors"> <sch:report test="@resolve_group">DEPRECATED BEHAVIOR IN: fileauditedpermissions_object </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:extension> </xsd:complexContent> </xsd:complexType> <!-- =============================================================================== --> <!-- ======================== FILE EFFECTIVE RIGHTS TEST (53) ==================== --> <!-- =============================================================================== --> <xsd:element name="fileeffectiverights53_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The file effective rights test is used to check the effective rights associated with Windows files. Note that the trustee's effective access rights are the access rights that the DACL grants to the trustee or to any groups of which the trustee is a member. The fileeffectiverights53_test element extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a fileeffectiverights53_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>fileeffectiverights53_test</oval:test> <oval:object>fileeffectiverights53_object</oval:object> <oval:state>fileeffectiverights53_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">fileeffectiverights_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_fer53tst"> <sch:rule context="win-def:fileeffectiverights53_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:fileeffectiverights53_object/@id"><sch:value-of select="../@id"/> - the object child element of a fileeffectiverights53_test must reference a fileeffectiverights53_object</sch:assert> </sch:rule> <sch:rule context="win-def:fileeffectiverights53_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:fileeffectiverights53_state/@id"><sch:value-of select="../@id"/> - the state child element of a fileeffectiverights53_test must reference a fileeffectiverights53_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="fileeffectiverights53_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The fileeffectiverights53_object element is used by a file effective rights test to define the objects used to evalutate against the specified state. The fileeffectiverights53_object will collect directories and all Windows file types (FILE_TYPE_CHAR, FILE_TYPE_DISK, FILE_TYPE_PIPE, FILE_TYPE_REMOTE, and FILE_TYPE_UNKNOWN). Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic.</xsd:documentation> <xsd:documentation>A fileeffectiverights53_object is defined as a combination of a Windows file and trustee SID. The file represents the file to be evaluated while the trustee SID represents the account (SID) to check effective rights of. If multiple files or SIDs are matched by either reference, then each possible combination of file and SID is a matching file effective rights object. In addition, a number of behaviors may be provided that help guide the collection of objects. Please refer to the FileEffectiveRights53Behaviors complex type for more information about specific behaviors.</xsd:documentation> <xsd:documentation>The set of files to be evaluated may be identified with either a complete filepath or a path and filename. Only one of these options may be selected.</xsd:documentation> <xsd:documentation>It is important to note that the 'max_depth' and 'recurse_direction' attributes of the 'behaviors' element do not apply to the 'filepath' element, only to the 'path' and 'filename' elements. This is because the 'filepath' element represents an absolute path to a particular file and it is not possible to recurse over a file.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fileeffectiverights53_object_verify_filter_state"> <sch:rule context="win-def:fileeffectiverights53_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:fileeffectiverights53_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='fileeffectiverights53_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:FileEffectiveRights53Behaviors" minOccurs="0"/> <xsd:choice> <xsd:element name="filepath" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The filepath element specifies the absolute path for a file on the machine. A directory cannot be specified as a filepath.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fer53objfilepath"> <sch:rule context="win-def:fileeffectiverights53_object/win-def:filepath"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth or @recurse_direction])"><sch:value-of select="../@id"/> - the max_depth and recurse_direction behaviors are not allowed with a filepath entity</sch:assert> </sch:rule> </sch:pattern> <sch:pattern id="win-def_fer53objfilepath2"> <sch:rule context="win-def:fileeffectiverights53_object/win-def:filepath[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_file_system='defined'])"><sch:value-of select="../@id"/> - the recurse_file_system behavior MUST not be set to 'defined' when a pattern match is used with a filepath entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:sequence> <xsd:element name="path" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a file on the machine.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fer53objpath"> <sch:rule context="win-def:fileeffectiverights53_object/win-def:path[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_file_system='defined'])"><sch:value-of select="../@id"/> - the recurse_file_system behavior MUST not be set to 'defined' when a pattern match is used with a path entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth])"><sch:value-of select="../@id"/> - the max_depth behavior MUST not be used when a pattern match is used with a path entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_direction])"><sch:value-of select="../@id"/> - the recurse_direction behavior MUST not be used when a pattern match is used with a path entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of a file to evaluate. If the xsi:nil attribute is set to true, then the object being specified is the higher level directory object (not all the files in the directory). In this case, the filename element should not be used during collection and would result in the unique set of items being the directories themselves. For example, one would set xsi:nil to true if the desire was to test the attributes or permissions associated with a directory. Setting xsi:nil equal to true is different than using a .* pattern match, which says to collect every file under a given path..</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fer53objfilename"> <sch:rule context="win-def:fileeffectiverights53_object/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> <sch:assert test="(@var_ref and .='') or ((@xsi:nil='1' or @xsi:nil='true') and .='') or not(.='') or (.='' and @operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot be empty unless the xsi:nil attribute is set to true or a var_ref is used</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:choice> <xsd:element name="trustee_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_sid entity identifies a unique SID associated with a user, group, system, or program (such as a Windows service). If an operation other than equals is used to identify matching trustees (i.e. not equal, or a pattern match) then the resulting matches shall be limited to only the trustees referenced in the file's Security Descriptor. The scope is limited here to avoid unnecessarily resource intensive searches for trustees. Note that the larger scope of all known trustees may be obtained through the use of variables.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="fileeffectiverights53_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The fileeffectiverights53_state element defines the different rights that can be associated with a given fileeffectiverights53_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="filepath" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The filepath element specifies the absolute path for a file on the machine. A directory cannot be specified as a filepath.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="path" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a file on the machine.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of the file.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fer53stefilename"> <sch:rule context="win-def:fileeffectiverights53_state/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The trustee_sid element is the unique SID that associated a user, group, system, or program (such as a Windows service).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_data" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read data from the file, or if a directory, grants the right to list the contents of the directory.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_data" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to write data to the file, or if a directory, grants the right to add a file to the directory.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_append_data" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to append data to the file, or if a directory, grants the right to add a sub-directory to the directory.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_ea" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read extended attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_ea" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to write extended attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_execute" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to execute a file, or if a directory, the right to traverse the directory.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_delete_child" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Right to delete a directory and all the files it contains (its children), even if the files are read-only.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_attributes" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read file, or directory, attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_attributes" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to change file, or directory, attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="windows_view" type="win-def:EntityStateWindowsViewType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The windows view value to which this was targeted. This is used to indicate which view (32-bit or 64-bit), the associated State applies to.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="FileEffectiveRights53Behaviors"> <xsd:annotation> <xsd:documentation>The FileEffectiveRights53Behaviors complex type defines a number of behaviors that allow a more detailed definition of the fileeffectiverights53_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> <xsd:documentation>It is important to note that the 'max_depth' and 'recurse_direction' attributes of the 'behaviors' element do not apply to the 'filepath' element, only to the 'path' and 'filename' elements. This is because the 'filepath' element represents an absolute path to a particular file and it is not possible to recurse over a file.</xsd:documentation> <xsd:documentation>The FileEffectiveRights53Behaviors extend the win-def:FileBehaviors and therefore include the behaviors defined by that type.</xsd:documentation> </xsd:annotation> <xsd:complexContent> <xsd:extension base="win-def:FileBehaviors"> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group SID should be included in the object when the object is defined by a group SID. For example, the intent of an object defined by a group SID might be to retrieve all the user SIDs that are a member of the group, but not the group SID itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_ffr53_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:fileeffectiverights53_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:fileeffectiverights53_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>The 'resolve_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to resolve the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_ffr53_resolve_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:fileeffectiverights53_object/win-def:behaviors"> <sch:report test="@resolve_group">DEPRECATED BEHAVIOR IN: fileeffectiverights53_object </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:extension> </xsd:complexContent> </xsd:complexType> <!-- =============================================================================== --> <!-- ================== FILE EFFECTIVE RIGHTS TEST (deprecated) ================== --> <!-- =============================================================================== --> <xsd:element name="fileeffectiverights_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The file effective rights test is used to check the effective rights associated with Windows files. Note that the trustee's effective access rights are the access rights that the DACL grants to the trustee or to any groups of which the trustee is a member. The fileeffectiverights_test element extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a fileeffectiverights_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>fileeffectiverights_test</oval:test> <oval:object>fileeffectiverights_object</oval:object> <oval:state>fileeffectiverights_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">fileeffectiverights_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the fileeffectiverights53_test. This test uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new test was created to use trustee SIDs, which are unique. See the fileeffectiverights53_test.</oval:reason> <oval:comment>This test has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_fertst_dep"> <sch:rule context="win-def:fileeffectiverights_test"> <sch:report test="true()">DEPRECATED TEST: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_fertst"> <sch:rule context="win-def:fileeffectiverights_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:fileeffectiverights_object/@id"><sch:value-of select="../@id"/> - the object child element of a fileeffectiverights_test must reference a fileeffectiverights_object</sch:assert> </sch:rule> <sch:rule context="win-def:fileeffectiverights_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:fileeffectiverights_state/@id"><sch:value-of select="../@id"/> - the state child element of a fileeffectiverights_test must reference a fileeffectiverights_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="fileeffectiverights_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The fileeffectiverights_object element is used by a file effective rights test to define the objects used to evalutate against the specified state. The fileeffectiverights_object will collect directories and all Windows file types (FILE_TYPE_CHAR, FILE_TYPE_DISK, FILE_TYPE_PIPE, FILE_TYPE_REMOTE, and FILE_TYPE_UNKNOWN). Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic.</xsd:documentation> <xsd:documentation>A fileeffectiverights_object is defined as a combination of a Windows file and trustee name. The file represents the file to be evaluated while the trustee name represents the account (SID) to check effective rights of. If multiple files or SIDs are matched by either reference, then each possible combination of file and SID is a matching file effective rights object. In addition, a number of behaviors may be provided that help guide the collection of objects. Please refer to the FileEffectiveRightsBehaviors complex type for more information about specific behaviors.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the fileeffectiverights_object. This object uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new object was created to use trustee SIDs, which are unique. See the fileeffectiverights53_object.</oval:reason> <oval:comment>This object has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_ferobj_dep"> <sch:rule context="win-def:fileeffectiverights_object"> <sch:report test="true()">DEPRECATED OBJECT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:FileEffectiveRightsBehaviors" minOccurs="0"/> <xsd:element name="path" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a file on the machine.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of a file to evaluate. If the xsi:nil attribute is set to true, then the object being specified is the higher level directory object (not all the files in the directory). In this case, the filename element should not be used during collection and would result in the unique set of items being the directories themselves. For example, one would set xsi:nil to true if the desire was to test the attributes or permissions associated with a directory. Setting xsi:nil equal to true is different than using a .* pattern match, which says to collect every file under a given path.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_fefobjfilename"> <sch:rule context="win-def:fileeffectiverights_object/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> <sch:assert test="(@var_ref and .='') or ((@xsi:nil='1' or @xsi:nil='true') and .='') or not(.='') or (.='' and @operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot be empty unless the xsi:nil attribute is set to true or a var_ref is used</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="trustee_name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_name element is the unique name that associated a particular SID. A SID can be associated with a user, group, or program (such as a Windows service). In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="fileeffectiverights_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The fileeffectiverights_state element defines the different rights that can be associated with a given fileeffectiverights_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the fileeffectiverights53_state. This state uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new state was created to use trustee SIDs, which are unique. See the fileeffectiverights53_state.</oval:reason> <oval:comment>This state has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_ferste_dep"> <sch:rule context="win-def:fileeffectiverights_state"> <sch:report test="true()">DEPRECATED STATE: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="path" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a file on the machine.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of the file.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_ferstefilename"> <sch:rule context="win-def:fileeffectiverights_state/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"><sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="trustee_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The unique name associated with a particular security identifier (SID). In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_data" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read data from the file, or if a directory, grants the right to list the contents of the directory.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_data" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to write data to the file, or if a directory, grants the right to add a file to the directory.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_append_data" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to append data to the file, or if a directory, grants the right to add a sub-directory to the directory.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_ea" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read extended attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_ea" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to write extended attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_execute" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to execute a file, or if a directory, the right to traverse the directory.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_delete_child" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Right to delete a directory and all the files it contains (its children), even if the files are read-only.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_attributes" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to read file, or directory, attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_write_attributes" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Grants the right to change file, or directory, attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="windows_view" type="win-def:EntityStateWindowsViewType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The windows view value to which this was targeted. This is used to indicate which view (32-bit or 64-bit), the associated State applies to.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="FileEffectiveRightsBehaviors"> <xsd:annotation> <xsd:documentation>The FileEffectiveRightsBehaviors complex type defines a number of behaviors that allow a more detailed definition of the fileeffectiverights_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> <xsd:documentation>The FileEffectiveRightsBehaviors extend the win-def:FileBehaviors and therefore include the behaviors defined by that type.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the FileEffectiveRightsBehaviors53. The FileEffectiveRightsBehaviors complex type is used by the fileeffectiverights_test which uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new test was created to use trustee SIDs, which are unique. This new test utilizes the FileEffectiveRightsBehaviors53 complex type, and as a result, the FileEffectiveRightsBehaviors complex type is no longer needed.</oval:reason> <oval:comment>This complex type has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> </xsd:appinfo> </xsd:annotation> <xsd:complexContent> <xsd:extension base="win-def:FileBehaviors"> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group trustee name should be included in the object when the object is defined by a group trustee name. For example, the intent of an object defined by a group SID might be to retrieve all the user trustee names that are members of the group, but not the group trustee name itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_ffr_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:fileeffectiverights_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:fileeffectiverights_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>The 'resolve_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_object or similar to resolve the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_ffr_resolve_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:fileeffectiverights_object/win-def:behaviors"> <sch:report test="@resolve_group">DEPRECATED BEHAVIOR IN: fileeffectiverights_object </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:extension> </xsd:complexContent> </xsd:complexType> <!-- =============================================================================== --> <!-- ================================ GROUP TEST ================================= --> <!-- =============================================================================== --> <xsd:element name="group_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The group_test allows the different users and subgroups, that directly belong to specific groups (identified by name), to be tested. When the group_test collects the groups on the system, it should only include the local and built-in group accounts and not domain group accounts. However, it is important to note that domain group accounts can still be looked up. Also, note that the subgroups of the group will not be resolved to find indirect user and group members. If the subgroups need to be resolved, it should be done using the sid_object. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a group_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>group_test</oval:test> <oval:object>group_object</oval:object> <oval:state>group_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">group_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>Replaced by the group_sid_test. This test uses trustee names for identifying accounts on the system. Trustee names are not unique and the group_sid_test, which uses trustee SIDs which are unique, should be used instead. See the group_sid_test.</oval:reason> <oval:comment>This test has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_grouptst_dep"> <sch:rule context="win-def:group_test"> <sch:report test="true()">DEPRECATED TEST: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_grouptst"> <sch:rule context="win-def:group_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:group_object/@id"><sch:value-of select="../@id"/> - the object child element of a group_test must reference a group_object</sch:assert> </sch:rule> <sch:rule context="win-def:group_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:group_state/@id"><sch:value-of select="../@id"/> - the state child element of a group_test must reference a group_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="group_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The group_object element is used by a group test to define the specific group(s) (identified by name) to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>Replaced by the group_sid_object. This object uses trustee names for identifying accounts on the system. Trustee names are not unique and the group_sid_object, which uses trustee SIDs which are unique, should be used instead. See the group_sid_object.</oval:reason> <oval:comment>This object has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_groupobj_dep"> <sch:rule context="win-def:group_object"> <sch:report test="true()">DEPRECATED OBJECT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_group_object_verify_filter_state"> <sch:rule context="win-def:group_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:group_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='group_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="group" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The group element holds a string that represents the name of a particular group. In Windows, group names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, the group should be identified in the form: "domain\group name". In a local environment, the group should be identified in the form: "computer name\group name". If the group is a built-in group, the group should be identified in the form: "group name" without a domain component.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="group_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The group_state element enumerates the different users and subgroups directly associated with a Windows group. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>Replaced by the group_sid_state. This state uses trustee names for identifying accounts on the system. Trustee names are not unique and the group_sid_state, which uses trustee SIDs which are unique, should be used instead. See the group_sid_state.</oval:reason> <oval:comment>This state has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_groupste_dep"> <sch:rule context="win-def:group_state"> <sch:report test="true()">DEPRECATED STATE: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="group" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The group element holds a string that represents the name of a particular group. In Windows, group names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, groups should be identified in the form: "domain\group name". For local groups use: "computer name\group name". For built-in accounts on the system, use the group name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="user" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The user element holds a string that represents the name of a particular user. In Windows, user names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, users should be identified in the form: "domain\user name". For local users use: "computer name\user name". For built-in accounts on the system, use the user name without a domain.</xsd:documentation> <xsd:documentation>The user element can be included multiple times in a system characteristic item in order to record that a group contains a number of different users. Note that the entity_check attribute associated with EntityStateStringType guides the evaluation of entities like user that refer to items that can occur an unbounded number of times.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="subgroup" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>A string that represents the name of a particular subgroup in the specified group. In Windows, group names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, the subgroups should be identified in the form: "domain\group name". In a local environment, the subgroups should be identified in the form: "computer name\group name". If the subgroups are built-in groups, the subgroups should be identified in the form: "group name" without a domain component.</xsd:documentation> <xsd:documentation>The subgroup element can be included multiple times in a system characteristic item in order to record that a group contains a number of different subgroups. Note that the entity_check attribute associated with EntityStateStringType guides the evaluation of entities like the subgroup entity that refer to items that can occur an unbounded number of times.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ============================== GROUP SID TEST =============================== --> <!-- =============================================================================== --> <xsd:element name="group_sid_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The group_sid_test allows the different users and subgroups, that directly belong to specific groups (identified by SID), to be tested. When the group_sid_test collects the group SIDs on the system, it should only include the local and built-in group SIDs and not domain group SIDs. However, it is important to note that domain group SIDs can still be looked up. Also, note that the subgroups of the group will not be resolved to find indirect user and group members. If the subgroups need to be resolved, it should be done using the sid_sid_object. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a group_sid_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>group_sid_test</oval:test> <oval:object>group_sid_object</oval:object> <oval:state>group_sid_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">group_sid_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_groupsidtst"> <sch:rule context="win-def:group_sid_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:group_sid_object/@id"><sch:value-of select="../@id"/> - the object child element of a group_sid_test must reference a group_sid_object</sch:assert> </sch:rule> <sch:rule context="win-def:group_sid_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:group_sid_state/@id"><sch:value-of select="../@id"/> - the state child element of a group_sid_test must reference a group_sid_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="group_sid_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The group_sid_object element is used by a group_test to define the specific group(s) (identified by SID) to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_group_sid_object_verify_filter_state"> <sch:rule context="win-def:group_sid_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:group_sid_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='group_sid_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="group_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The group_sid entity holds a string that represents the SID of a particular group.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="group_sid_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The group_state element enumerates the different users and subgroups directly associated with a Windows group. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="group_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The group_sid entity holds a string that represents the SID of a particular group.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="user_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The user_sid entity holds a string that represents the SID of a particular user. This entity can be included multiple times in a system characteristic item in order to record that a group contains a number of different users. Note that the entity_check attribute associated with EntityStateStringType guides the evaluation of entities like user that refer to items that can occur an unbounded number of times.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="subgroup_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The subgroup_sid entity holds a string that represents the SID of particular subgroup in the specified group. This entity can be included multiple times in a system characteristic item in order to record that a group contains a number of different subgroups. Note that the entity_check attribute associated with EntityStateStringType guides the evaluation of entities like subgroup_sid that refer to items that can occur an unbounded number of times.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ============================== INTERFACE TEST =============================== --> <!-- =============================================================================== --> <xsd:element name="interface_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The interface test enumerate various attributes about the interfaces on a system. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references an interface_object and the optional state element specifies the interface information to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>interface_test</oval:test> <oval:object>interface_object</oval:object> <oval:state>interface_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">interface_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_wininterfacetst"> <sch:rule context="win-def:interface_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:interface_object/@id"><sch:value-of select="../@id"/> - the object child element of an interface_test must reference an interface_object</sch:assert> </sch:rule> <sch:rule context="win-def:interface_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:interface_state/@id"><sch:value-of select="../@id"/> - the state child element of an interface_test must reference an interface_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="interface_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The interface_object element is used by an interface test to define the specific interfaces(s) to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>An interface object consists of a single name entity that identifies which interface is being specified. For help understanding this object, see the MIB_IFROW and MIB_IPADDRROW structures.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_interface_object_verify_filter_state"> <sch:rule context="win-def:interface_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:interface_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='interface_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The name element specifies the name of an interface.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="interface_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The interface_state element enumerates the different properties associate with a Windows interface. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The name element specifies the name of an interface.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="index" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The index element specifies index that identifies the interface.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="type" type="win-def:EntityStateInterfaceTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The type element specifies the type of interface which is limited to certain set of values.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="hardware_addr" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The hardware_addr entity is the hardware or MAC address of the physical network card. MAC addresses should be formatted according to the IEEE 802-2001 standard which states that a MAC address is a sequence of six octet values, separated by hyphens, where each octet is represented by two hexadecimal digits. Uppercase letters should also be used to represent the hexadecimal digits A through F.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="inet_addr" type="oval-def:EntityStateIPAddressStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The inet_addr element specifies the IP address. Note that the IP address can be IPv4 or IPv6. If the IP address is an IPv6 address, this entity will be expressed as an IPv6 address prefix using CIDR notation and the netmask entity will not be collected.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="broadcast_addr" type="oval-def:EntityStateIPAddressStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The broadcast_addr element specifies the broadcast address. A broadcast address is typically the IP address with the host portion set to either all zeros or all ones. Note that the IP address can be IPv4 or IPv6.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="netmask" type="oval-def:EntityStateIPAddressStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The netmask element specifies the subnet mask for the IP address. Note that if the inet_addr entity contains an IPv6 address prefix, this entity will not be collected.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="addr_type" type="win-def:EntityStateAddrTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The addr_type element specifies the address type or state of a specific interface. Each interface can be associated with more than one value meaning the addr_type element can occur multiple times in a system characteristic item. Note that the entity_check attribute associated with EntityStateAddrTypeType guides the evaluation of unbounded entities like addr_type.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- =============================== LICENSE TEST ================================ --> <!-- =============================================================================== --> <xsd:element name="license_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The license_test is used to check the content of a particular entry in the Windows registry HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions key, ProductPolicy value. Access to this data is exposed by the functions NtQueryLicenseValue (and also, in version 6.0 and higher, ZwQueryLicenseValue) in NTDLL.DLL.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="license_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The license_object element is used by a license_test to define the object to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The name entity provides the address of a UNICODE_STRING structure for the name of the value for which data is desired, for example, TabletPCPlatformInput-core-EnableTouchUI.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="license_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The license_state element defines the different information that can be found in the Windows license registry value. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The name entity corresponds to the license_object name entity.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="type" type="win-def:EntityStateRegistryTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The optional type entity provides the type of data that is expected: REG_SZ (0x01) for a string; REG_BINARY (0x03) for binary data; REG_DWORD (0x04) for a dword.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="value" type="oval-def:EntityStateAnySimpleType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The value entity allows a test to be written against the value held within the specified license entry(-ies). If the value being tested is of type REG_BINARY, then the datatype attribute should be set to 'binary' and the data represented by the value entity should follow the xsd:hexBinary form. (each binary octet is encoded as two hex digits) If the value being tested is of type REG_DWORD, then the datatype attribute should be set to 'int' and the value entity should represent the data as an integer. If the specified registry key is of type REG_SZ, then the datatype should be 'string' and the value entity should be a copy of the string.</xsd:documentation> <xsd:documentation>Note that if the intent is to test a version number held in the license entry (as a reg_sz) then instead of setting the datatype to 'string', the datatype can be set to 'version'. This allows tools performing the evaluation to know how to perform less than and greater than operations correctly.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ============================ LOCKOUT POLICY TEST ============================ --> <!-- =============================================================================== --> <xsd:element name="lockoutpolicy_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The lockout policy test enumerates various attributes associated with lockout information for users and global groups in the security database. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a lockoutpolicy_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>lockoutpolicy_test</oval:test> <oval:object>lockoutpolicy_object</oval:object> <oval:state>lockoutpolicy_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">lockoutpolicy_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_lptst"> <sch:rule context="win-def:lockoutpolicy_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:lockoutpolicy_object/@id"><sch:value-of select="../@id"/> - the object child element of a lockoutpolicy_test must reference a lockoutpolicy_object</sch:assert> </sch:rule> <sch:rule context="win-def:lockoutpolicy_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:lockoutpolicy_state/@id"><sch:value-of select="../@id"/> - the state child element of a lockoutpolicy_test must reference a lockoutpolicy_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="lockoutpolicy_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The lockoutpolicy_object element is used by a lockout policy test to define those objects to evaluated based on a specified state. There is actually only one object relating to lockout policy and this is the system as a whole. Therefore, there are no child entities defined. Any OVAL Test written to check lockout policy will reference the same lockoutpolicy_object which is basically an empty object element.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"/> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="lockoutpolicy_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The lockoutpolicy_state element specifies the various attributes associated with lockout information for users and global groups in the security database. A lockout policy test will reference a specific instance of this state that defines the exact settings that need to be evaluated. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="force_logoff" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies, in seconds, the amount of time between the end of the valid logon time and the time when the user is forced to log off the network. A value of TIMEQ_FOREVER (-1) indicates that the user is never forced to log off. A value of zero indicates that the user will be forced to log off immediately when the valid logon time expires. See the USER_MODALS_INFO_0 structure returned by a call to NetUserModalsGet().</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="lockout_duration" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies, in seconds, how long a locked account remains locked before it is automatically unlocked. See the USER_MODALS_INFO_3 structure returned by a call to NetUserModalsGet().</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="lockout_observation_window" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies the maximum time, in seconds, that can elapse between any two failed logon attempts before lockout occurs. See the USER_MODALS_INFO_3 structure returned by a call to NetUserModalsGet().</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="lockout_threshold" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies the number of invalid password authentications that can occur before an account is marked "locked out." See the USER_MODALS_INFO_3 structure returned by a call to NetUserModalsGet().</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- =============================== METABASE TEST =============================== --> <!-- =============================================================================== --> <xsd:element name="metabase_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The metabase test is used to check information found in the Windows metabase. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a metabase_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>metabase_test</oval:test> <oval:object>metabase_object</oval:object> <oval:state>metabase_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">metabase_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_metabasetst"> <sch:rule context="win-def:metabase_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:metabase_object/@id"><sch:value-of select="../@id"/> - the object child element of a metabase_test must reference a metabase_object</sch:assert> </sch:rule> <sch:rule context="win-def:metabase_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:metabase_state/@id"><sch:value-of select="../@id"/> - the state child element of a metabase_test must reference a metabase_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="metabase_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The metabase_object element is used by a metabase test to define the specific metabase item(s) to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>A metabase object defines the key and id of the item(s).</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_metabase_object_verify_filter_state"> <sch:rule context="win-def:metabase_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:metabase_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='metabase_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="key" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The key element specifies a metabase key.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="id" type="oval-def:EntityObjectIntType" nillable="true"> <xsd:annotation> <xsd:documentation>The id element specifies a particular object under the metabase key. If the xsi:nil attribute is set to true, then the object being specified is the higher level key. In this case, the id element should not be collected or used in analysis. Setting xsi:nil equal to true is different than using a .* pattern match, says to collect every id under a given key. The most likely use for xsi:nil within a metabase object is when checking for the existence of a particular key, without regards to the different ids associated with it.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="metabase_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The metabase_state element defines the different metadata associate with a metabase item. This includes the name, user type, data type, and the actual data. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="key" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The key element specifies a metabase key.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="id" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The id element specifies a particular object under the metabase key.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The name element describes the name of the specified metabase object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="user_type" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The user_type element is an unsigned 32-bit integer (DWORD) that specifies the user type of the data. See the METADATA_RECORD structure.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="data_type" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The data_type element identifies the type of data in the metabase entry. See the METADATA_RECORD structure.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="data" type="oval-def:EntityStateAnySimpleType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The actual data of the named item under the specified metabase key</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- =============================== NTUSER TEST =============================== --> <!-- =============================================================================== --> <xsd:element name="ntuser_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The ntuser test is used to check metadata associated with Windows ntuser.dat files. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a ntuser_object and the optional state element specifies the ntuser data to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>ntuser_test</oval:test> <oval:object>ntuser_object</oval:object> <oval:state>ntuser_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">ntuser_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_ntusertst"> <sch:rule context="win-def:ntuser_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:ntuser_object/@id"><sch:value-of select="../@id"/> - the object child element of a ntuser_test must reference a ntuser_object</sch:assert> </sch:rule> <sch:rule context="win-def:ntuser_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:ntuser_state/@id"><sch:value-of select="../@id"/> - the state child element of a ntuser_test must reference a ntuser_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="ntuser_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The ntuser_object element is used to specify which metadata should be collected from a Windows ntuser.dat file. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_ntuser_object_verify_filter_state"> <sch:rule context="win-def:ntuser_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:ntuser_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='ntuser_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:NTUserBehaviors" minOccurs="0"/> <xsd:element name="key" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The key element describes a registry key to be collected. Note that the hive portion of the string should not be included, as this data is not neccessary for the ntuser test and would normally reside in the HKCU hive.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_ntuserobjkey2"> <sch:rule context="win-def:ntuser_object/win-def:key[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth])"><sch:value-of select="../@id"/> - the max_depth behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_direction])"><sch:value-of select="../@id"/> - the recurse_direction behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="name" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The name element describes the name assigned to a value associated with a specific registry key. If an empty string is specified for the name element, the registry key's default value should be collected. If the xsi:nil attribute is set to true, then the object being specified is the higher level key. In this case, the name element should not be collected or used in analysis. Setting xsi:nil equal to true on an element is different than using a .* pattern match. A .* pattern match says to collect every name under a given hive/key. The most likely use for xsi:nil within a registry object is when checking for the existence of a particular key, without regards to the different names associated with it.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="ntuser_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The ntuser_state element defines the different metadata associated with a ntuser.dat file. This includes the key, name, type, and value. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="key" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element describes a registry key normally found in the HKCU hive to be tested.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element describes the name of a value of a registry key.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element holds a string that represents the SID of a particular user.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="username" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The username entity holds a string that represents the name of a particular user. In Windows, user names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, users should be identified in the form: "domain\user name". For local users use: "computer name\user name".</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="account_type" type="win-def:EntityStateNTUserAccountTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The account_type element describes if the user account is a local account or domain account.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="logged_on" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The logged_on element describes if the user account is currently logged on to the computer.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="enabled" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The enabled element describes if the user account is enabled or disabled.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="date_modified" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Time of last modification of file. The integer should represent the FILETIME structure which is a 64-bit value representing the number of 100-nanosecond intervals since January 1, 1601 (UTC).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="days_since_modified" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The number of days since the ntuser.dat file was last modified. The value should be rounded up to the next whole integer.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filepath" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element describes the filepath of the ntuser.dat file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="last_write_time" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The last time that the key or any of its value entries was modified. The value of this entity represents the FILETIME structure which is a 64-bit value representing the number of 100-nanosecond intervals since January 1, 1601 (UTC). Last write time can be queried on a key or name. When collecting only information about a registry key the last write time will be the time the key or any of its entiries was written to. When collecting only information about a registry name the last write time will be the time the name was written to. See the RegQueryInfoKey function lpftLastWriteTime.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="type" type="win-def:EntityStateRegistryTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The type entity allows a test to be written against the registy type associated with the specified registry key(s). Please refer to the documentation on the EntityStateRegistryTypeType for more information about the different valid individual types.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="value" type="oval-def:EntityStateAnySimpleType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The value entity allows a test to be written against the value held within the specified registry key(s). If the value being tested is of type REG_BINARY, then the datatype attribute should be set to 'binary' and the data represented by the value entity should follow the xsd:hexBinary form. (each binary octet is encoded as two hex digits) If the value being tested is of type REG_DWORD or REG_QWORD, then the datatype attribute should be set to 'int' and the value entity should represent the data as an integer. If the value being tested is of type REG_EXPAND_SZ, then the datatype attribute should be set to 'string' and the pre-expanded string should be represented by the value entity. If the value being tested is of type REG_MULTI_SZ, then only a single string (one of the multiple strings) should be tested using the value entity with the datatype attribute set to 'string'. In order to test multiple values, multiple OVAL registry tests should be used. If the specified registry key is of type REG_SZ, then the datatype should be 'string' and the value entity should be a copy of the string.</xsd:documentation> <xsd:documentation>Note that if the intent is to test a version number held in the registry (as a reg_sz) then instead of setting the datatype to 'string', the datatype can be set to 'version'. This allows tools performing the evaluation to know how to perform less than and greater than operations correctly.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="NTUserBehaviors"> <xsd:annotation> <xsd:documentation>The NTUserBehaviors complex type defines a number of behaviors that allow a more detailed definition of the ntuser_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> </xsd:annotation> <xsd:attribute name="include_default" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>'include_default' defines if the Window's local Default ntuser.dat file is included in the results. By default, this file is not included in the results.</xsd:documentation> <xsd:documentation>The Default User's directory which contains the ntuser.dat file is stored in the registry at 'HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows NT/CurrentVersion/ProfileList/Default'.</xsd:documentation> </xsd:annotation> </xsd:attribute> <xsd:attribute name="max_depth" use="optional" default="-1"> <xsd:annotation> <xsd:documentation>'max_depth' defines the maximum depth of recursion to perform when a recurse_direction is specified. A value of '0' is equivalent to no recursion, '1' means to step only one directory level up/down, and so on. The default value is '-1' meaning no limitation. For a 'max_depth' of -1 or any value of 1 or more the starting key must be considered in the recursive search.</xsd:documentation> <xsd:documentation>Note that the default recurse_direction behavior is 'none' so even though max_depth specifies no limitation by default, the recurse_direction behavior turns recursion off.</xsd:documentation> <xsd:documentation>Note that this behavior only applies with the equality operation on the key entity.</xsd:documentation> </xsd:annotation> <xsd:simpleType> <xsd:restriction base="xsd:integer"> <xsd:fractionDigits value="0"/> <xsd:minInclusive value="-1"/> </xsd:restriction> </xsd:simpleType> </xsd:attribute> <xsd:attribute name="recurse_direction" use="optional" default="none"> <xsd:annotation> <xsd:documentation>'recurse_direction' defines the direction, either 'up' to parent keys, or 'down' into child keys to recursively search for registry keys. When recursing up or down, one is limited by the max_depth behavior. Note that it is not an error if max_depth specifies a certain level of recursion and that level does not exist. Recursing should only go as deep as available. The default value is 'none' for no recursion.</xsd:documentation> <xsd:documentation>Note that this behavior only applies with the equality operation on the key entity.</xsd:documentation> </xsd:annotation> <xsd:simpleType> <xsd:restriction base="xsd:string"> <xsd:enumeration value="none"/> <xsd:enumeration value="up"/> <xsd:enumeration value="down"/> </xsd:restriction> </xsd:simpleType> </xsd:attribute> <xsd:attribute name="windows_view" use="optional" default="64_bit"> <xsd:annotation> <xsd:documentation>64-bit versions of Windows provide an alternate file system and registry views to 32-bit applications. This behavior allows the OVAL Object to specify which view should be examined. This behavior only applies to 64-bit Windows, and must not be applied on other platforms. </xsd:documentation> <xsd:documentation>Note that the values have the following meaning: '64_bit' – Indicates that the 64-bit view on 64-bit Windows operating systems must be examined. On a 32-bit system, the Object must be evaluated without applying the behavior. '32_bit' – Indicates that the 32-bit view must be examined. On a 32-bit system, the Object must be evaluated without applying the behavior. It is recommended that the corresponding 'windows_view' entity be set on the OVAL Items that are collected when this behavior is used to distinguish between the OVAL Items that are collected in the 32-bit or 64-bit views.</xsd:documentation> </xsd:annotation> <xsd:simpleType> <xsd:restriction base="xsd:string"> <xsd:enumeration value="32_bit"/> <xsd:enumeration value="64_bit"/> </xsd:restriction> </xsd:simpleType> </xsd:attribute> </xsd:complexType> <!-- =============================================================================== --> <!-- =========================== PASSWORD POLICY TEST ============================ --> <!-- =============================================================================== --> <xsd:element name="passwordpolicy_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The password policy test is used to check specific policy associated with passwords. It is important to note that these policies are specific to certain versions of Windows. As a result, the documentation for that version of Windows should be consulted for more information. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a passwordpolicy_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:documentation>NOTE: This information is stored in the SAM or Active Directory but is encrypted or hidden so the registry_test and activedirectory57_test are of no use. If this can be figured out, then the password_policy test is not needed.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>passwordpolicy_test</oval:test> <oval:object>passwordpolicy_object</oval:object> <oval:state>passwordpolicy_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">passwordpolicy_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_pptst"> <sch:rule context="win-def:passwordpolicy_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:passwordpolicy_object/@id"><sch:value-of select="../@id"/> - the object child element of a passwordpolicy_test must reference a passwordpolicy_object</sch:assert> </sch:rule> <sch:rule context="win-def:passwordpolicy_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:passwordpolicy_state/@id"><sch:value-of select="../@id"/> - the state child element of a passwordpolicy_test must reference a passwordpolicy_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="passwordpolicy_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The passwordpolicy_object element is used by a password policy test to define those objects to evaluated based on a specified state. There is actually only one object relating to password policy and this is the system as a whole. Therefore, there are no child entities defined. Any OVAL Test written to check password policy will reference the same passwordpolicy_object which is basically an empty object element.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"/> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="passwordpolicy_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The passwordpolicy_state element specifies the various policies associated with passwords. A password policy test will reference a specific instance of this state that defines the exact settings that need to be evaluated.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="max_passwd_age" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies, in seconds, the maximum allowable password age. A value of TIMEQ_FOREVER (-1) indicates that the password never expires. The minimum valid value for this element is ONE_DAY (86400).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="min_passwd_age" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies the minimum number of seconds that can elapse between the time a password changes and when it can be changed again. A value of zero indicates that no delay is required between password updates.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="min_passwd_len" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies the minimum allowable password length. Valid values for this element are zero through PWLEN.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="password_hist_len" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies the length of password history maintained. A new password cannot match any of the previous usrmod0_password_hist_len passwords. Valid values for this element are zero through DEF_MAX_PWHIST.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="password_complexity" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>A boolean value that signifies whether passwords must meet the complexity requirements put forth by the operating system.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="reversible_encryption" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Determines whether or not passwords are stored using reversible encryption.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ============================== PE HEADER TEST =============================== --> <!-- =============================================================================== --> <xsd:element name="peheader_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The peheader_test is used to check data from a Portable Executable file header. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a peheader_object and the optional state element specifies the metadata to check.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="peheader_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The peheader_object is used by a peheader_test to define the specific file(s) whose headers should be evaluated. The peheader_object will collect header information from PE files. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>A peheader_object defines the path and filename or complete filepath of the file(s). In addition, a number of behaviors may be provided that help guide the collection of objects. Please refer to the PEHeaderBehaviors complex type for more information about specific behaviors.</xsd:documentation> <xsd:documentation>The set of files whose headers should be evaluated may be identified with either a complete filepath or a path and filename. Only one of these options may be selected.</xsd:documentation> <xsd:documentation>It is important to note that the 'max_depth' and 'recurse_direction' attributes of the 'behaviors' element do not apply to the 'filepath' element, only to the 'path' and 'filename' elements. This is because the 'filepath' element represents an absolute path to a particular file and it is not possible to recurse over a file.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:FileBehaviors" minOccurs="0" maxOccurs="1"/> <xsd:choice> <xsd:element name="filepath" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The filepath element specifies the absolute path for a PE file on the machine. A directory cannot be specified as a filepath.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_peheaderobjfilepath"> <sch:rule context="win-def:peheader_object/win-def:filepath"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth or @recurse_direction])"><sch:value-of select="../@id"/> - the max_depth and recurse_direction behaviors are not allowed with a filepath entity</sch:assert> </sch:rule> </sch:pattern> <sch:pattern id="win-def_peheaderobjfilepath2"> <sch:rule context="win-def:peheader_object/win-def:filepath[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_file_system='defined'])"><sch:value-of select="../@id"/> - the recurse_file_system behavior MUST not be set to 'defined' when a pattern match is used with a filepath entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:sequence> <xsd:element name="path" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a PE file on the machine.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_peheaderobjpath"> <sch:rule context="win-def:peheader_object/win-def:filepath[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_file_system='defined'])"><sch:value-of select="../@id"/> - the recurse_file_system behavior MUST not be set to 'defined' when a pattern match is used with a path entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth])"><sch:value-of select="../@id"/> - the max_depth behavior MUST not be used when a pattern match is used with a path entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_direction])"><sch:value-of select="../@id"/> - the recurse_direction behavior MUST not be used when a pattern match is used with a path entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of a PE file to evaluate.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_peheaderobjfilename"> <sch:rule context="win-def:peheader_object/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"> <sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:choice> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="peheader_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The peheader_state defines the different metadata associated with the header of a PE file. Please refer to the individual elements in the schema for more details about what each represents. For more information, please see the documentation for the IMAGE_FILE_HEADER and IMAGE_OPTIONAL_HEADER structures.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="filepath" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The filepath element specifies the absolute path for a PE file on the machine. A directory cannot be specified as a filepath.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="path" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The path element specifies the directory component of the absolute path to a PE file on the machine.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="filename" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The filename element specifies the name of a PE file to evaluate.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_peheaderstefilename"> <sch:rule context="win-def:peheader_state/win-def:filename"> <sch:assert test="(not(contains(.,'\') or contains(.,'/') or contains(.,':') or contains(.,'*') or contains(.,'?') or contains(.,'>') or contains(.,'|') or contains(.,'<') or contains(.,'"'))) or (@operation='pattern match')"> <sch:value-of select="../@id"/> - filename entity cannot contain the characters / \ : * ? > | < "</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="header_signature" type="oval-def:EntityStateStringType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The header_signature entity is the signature of the header.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="target_machine_type" type="win-def:EntityStatePeTargetMachineType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The target_machine_type entity is an unsigned 16-bit integer (WORD) that specifies the target architecture that the file is intended for.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="number_of_sections" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The number_of_sections entity is an unsigned 16-bit integer (WORD) that specifies the number of sections in the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="time_date_stamp" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The time_date_stamp entity is an unsigned 32-bit integer (DWORD) that specifies the time that the linker produced the file. The value is represented as the number of seconds since January 1, 1970, 00:00:00.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="pointer_to_symbol_table" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The pointer_to_symbol_table entity is an unsigned 32-bit integer (DWORD) that specifies the file offset of the COFF symbol table.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="number_of_symbols" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The number_of_symbols entity is an unsigned 32-bit integer (DWORD) that specifies the number of symbols in the COFF symbol table.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size_of_optional_header" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The size_of_optional_header entity is an unsigned 32-bit integer (DWORD) that specifies the size of an optional header in bytes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_relocs_stripped" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_relocs_stripped entity is a boolean value that specifies if the relocation information is stripped from the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_executable_image" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_executable_image entity is a boolean value that specifies if the file is executable.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_line_nums_stripped" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_line_nums_stripped entity is a boolean value that specifies if the line numbers are stripped from the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_local_syms_stripped" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_local_syms_stripped entity is a boolean value that specifies if the local symbols are stripped from the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_aggresive_ws_trim" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_aggressive_ws_trim entity is a boolean value that specifies that the working set should be aggressively trimmed.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_large_address_aware" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_large_address_aware entity is a boolean value that specifies that the application can handle addresses larger than 2GB.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_16bit_machine" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_16bit_machine entity is a boolean value that specifies that the computer supports 16-bit words.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_bytes_reversed_lo" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_bytes_reversed_lo entity is a boolean value that specifies that the bytes of the word are reversed.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_32bit_machine" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_32bit_machine entity is a boolean value that specifies that the computer supports 32-bit words.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_debug_stripped" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_debug_stripped entity is a boolean value that specifies that the debugging information is stored separately in a .dbg file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_removable_run_from_swap" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_removable_run_from_swap entity is a boolean value that specifies that the image is on removable media, copy and run from the swap file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_system" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_system entity is a boolean value that specifies that the image is a system file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_dll" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_dll entity is a boolean value that specifies that the image is a DLL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_up_system_only" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_up_system_only entity is a boolean value that specifies that the file should only be run on a uniprocessor computer.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_file_bytes_reveresed_hi" type="oval-def:EntityStateBoolType" default="false" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_file_bytes_reversed_hi entity is a boolean value that specifies that the bytes of the word are reversed.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="magic_number" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The magic_number entity is an unsigned 16-bit integer (WORD) that specifies the state of the image file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="major_linker_version" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The major_linker_version entity is a BYTE that specifies the major version of the linker that produced the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="minor_linker_version" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The minor_linker_version entity is a BYTE that specifies the minor version of the linker that produced the file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size_of_code" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The size_of_code entity is an unsigned 32-bit integer (DWORD) that specifies the total size of all of the code sections.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size_of_initialized_data" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The size_of_initialized_data entity is an unsigned 32-bit integer (DWORD) that specifies the total size of all of the sections that are composed of initialized data.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size_of_uninitialized_data" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The size_of_uninitialized_data entity is an unsigned 32-bit integer (DWORD) that specifies the total size of all of the sections that are composed of uninitialized data.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="address_of_entry_point" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The address_of_entry_point entity is an unsigned 32-bit integer (DWORD) that specifies the address where the loader will begin execution.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="base_of_code" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The base_of_code entity is an unsigned 32-bit integer (DWORD) that specifies the relative virtual address where the file's code section begins.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="base_of_data" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The base_of_data entity is an unsigned 32-bit integer (DWORD) that specifies the relative virtual address where the file's data section begins.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_base_address" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The image_base_address entity is an unsigned 32-bit integer (DWORD) that specifies the preferred address fo the first byte of the image when it is loaded into memory.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="section_alignment" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The section_alignment entity is an unsigned 32-bit integer (DWORD) that specifies the alignment of the sections loaded into memory.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_alignment" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The file_alignment entity is an unsigned 32-bit integer (DWORD) that specifies the alignment of the raw data of sections in the image file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="major_operating_system_version" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The major_operating_system_version entity is an unsigned 16-bit integer (WORD) that specifies the major version of the operating system required to use this executable.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="minor_operating_system_version" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The minor_operating_system_version entity is an unsigned 16-bit integer (WORD) that specifies the minor version of the operating system required to use this executable.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="major_image_version" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The major_image_version entity is an unsigned 16-bit integer (WORD) that specifies the major version number of the image.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="minor_image_version" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The minor_image_version entity is an unsigned 32-bit integer (DWORD) that specifies the minor version number of the image.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="major_subsystem_version" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The major_subsystem_version entity is an unsigned 16-bit integer (WORD) that specifies the major version of the subsystem required to run the executable.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="minor_susbsystem_version" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The minor_subsystem_version entity is an unsigned 16-bit integer (WORD) that specifies the minor version of the subsystem required to run the executable.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size_of_image" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The size_of_image entity is an unsigned 32-bit integer (DWORD) that specifies the total size of the image including all of the headers.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size_of_headers" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The size_of_headers entity is an unsigned 32-bit integer (DWORD) that specifies the total combined size of the MS-DOS stub, PE header, and the section headers.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="checksum" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The checksum entity is an unsigned 32-bit integer (DWORD) that specifies the checksum of the image file.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="subsystem" type="win-def:EntityStatePeSubsystemType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The subsystem entity is an unsigned 32-bit integer (DWORD) that specifies the type of subsystem that the executable uses for its user interface.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="dll_characteristics" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The dll_characteristics entity is an unsigned 32-bit integer (DWORD) that specifies the set of flags indicating the circumstances under which a DLL's initialization function will be called..</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size_of_stack_reserve" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The time_date_stamp entity is an unsigned 32-bit integer (DWORD) that specifies the number of bytes to reserve for the stack.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size_of_stack_commit" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The time_date_stamp entity is an unsigned 32-bit integer (DWORD) that specifies the number of bytes to commit for the stack.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size_of_heap_reserve" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The time_date_stamp entity is an unsigned 32-bit integer (DWORD) that specifies the number of bytes to reserve for the local heap.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="size_of_heap_commit" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The time_date_stamp entity is an unsigned 32-bit integer (DWORD) that specifies the number of bytes to commit for the local heap.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="loader_flags" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The loader_flags entity is an unsigned 32-bit integer (DWORD) that specifies the loader flags of the header.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="number_of_rva_and_sizes" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The number_of_rva_and_sizes entity is an unsigned 32-bit integer (DWORD) that specifies the number of directory entries in the remainder of the optional header.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="real_number_of_directory_entries" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The real_number_of_directory_entries entity is the real number of data directory entries in the remainder of the optional header calculated by enumerating the directory entries.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ================================= PORT TEST ================================= --> <!-- =============================================================================== --> <xsd:element name="port_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The port test is used to check information about the available ports on a Windows system. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a port_object and the optional state element specifies the port information to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>port_test</oval:test> <oval:object>port_object</oval:object> <oval:state>port_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">port_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_winporttst"> <sch:rule context="win-def:port_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:port_object/@id"><sch:value-of select="../@id"/> - the object child element of a port_test must reference a port_object</sch:assert> </sch:rule> <sch:rule context="win-def:port_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:port_state/@id"><sch:value-of select="../@id"/> - the state child element of a port_test must reference a port_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="port_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The port_object element is used by a port test to define the specific port(s) to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>A port object defines the local address, port number, and protocol of the port(s).</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_port_object_verify_filter_state"> <sch:rule context="win-def:port_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:port_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='port_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="local_address" type="oval-def:EntityObjectIPAddressStringType"> <xsd:annotation> <xsd:documentation>This element specifies the local IP address the listening port is bound to. Note that the IP address can be IPv4 or IPv6.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="local_port" type="oval-def:EntityObjectIntType"> <xsd:annotation> <xsd:documentation>This element specifies the number assigned to the local listening port.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="protocol" type="win-def:EntityObjectProtocolType"> <xsd:annotation> <xsd:documentation>This element specifies the type of listening port. It is restricted to either TCP or UDP.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="port_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The port_state element defines the different metadata associate with a Windows port. This includes the local address, port number, protocol, and pid. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="local_address" type="oval-def:EntityStateIPAddressStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the local IP address the listening port is bound to. Note that the IP address can be IPv4 or IPv6.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="local_port" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the number assigned to the local listening port.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="protocol" type="win-def:EntityStateProtocolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the type of listening port. It is restricted to either TCP or UDP.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="pid" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The id given to the process that is associated with the specified listening port.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="foreign_address" type="oval-def:EntityStateIPAddressStringType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>This is the IP address with which the program is communicating, or with which it will communicate, in the case of a listening server. Note that the IP address can be IPv4 or IPv6.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="foreign_port" type="oval-def:EntityStateStringType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>This is the TCP or UDP port to which the program communicates.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ======================= PRINTER EFFECTIVE RIGHTS TEST ======================= --> <!-- =============================================================================== --> <xsd:element name="printereffectiverights_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The printer effective rights test is used to check the effective rights associated with Windows printers. The printereffectiverights_test element extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a printereffectiverights_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>printereffectiverights_test</oval:test> <oval:object>printereffectiverights_object</oval:object> <oval:state>printereffectiverights_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">printereffectiverights_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_pertst"> <sch:rule context="win-def:printereffectiverights_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:printereffectiverights_object/@id"><sch:value-of select="../@id"/> - the object child element of a printereffectiverights_test must reference a printereffectiverights_object</sch:assert> </sch:rule> <sch:rule context="win-def:printereffectiverights_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:printereffectiverights_state/@id"><sch:value-of select="../@id"/> - the state child element of a printereffectiverights_test must reference a printereffectiverights_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="printereffectiverights_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation/> <xsd:appinfo> <sch:pattern id="win-def_printereffectiverights_object_verify_filter_state"> <sch:rule context="win-def:printereffectiverights_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:printereffectiverights_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='printereffectiverights_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:PrinterEffectiveRightsBehaviors" minOccurs="0"/> <xsd:element name="printer_name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The printer_name element describes a printer that a user may have rights on.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_sid entity identifies a unique SID associated with a user, group, system, or program (such as a Windows service). If an operation other than equals is used to identify matching trustees (i.e. not equal, or a pattern match) then the resulting matches shall be limited to only the trustees referenced in the printer's Security Descriptor. The scope is limited here to ensure that it is possible to avoid unnecessarily resource intensive searches for trustees. Note that the larger scope of all known trustees may be obtained through the use of variables.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="printereffectiverights_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The printereffectiverights_state element defines the different rights that can be associated with a given printereffectiverights_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="printer_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the name of the printer.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The trustee_sid element is the unique SID that associated a user, group, system, or program (such as a Windows service).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="printer_access_administer" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="printer_access_use" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="job_access_administer" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="job_access_read" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="PrinterEffectiveRightsBehaviors"> <xsd:annotation> <xsd:documentation>The PrinterEffectiveRightsBehaviors complex type defines a number of behaviors that allow a more detailed definition of the pritnereffectiverights_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> </xsd:annotation> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group trustee name should be included in the object when the object is defined by a group trustee name. For example, the intent of an object defined by a group trustee name might be to retrieve all the user trustee names that are members of the group, but not the group trustee name itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_pef_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:printereffectiverights_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:printereffectiverights_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>The 'resolve_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to resolve the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_pef_resolve_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:printereffectiverights_object/win-def:behaviors"> <sch:report test="@resolve_group">DEPRECATED BEHAVIOR IN: printereffectiverights_object </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:complexType> <!-- =============================================================================== --> <!-- =============================== PROCESS TEST ================================ --> <!-- =============================================================================== --> <xsd:element name="process_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The process_test is used to check information found in the Windows processes. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a process_object and the optional state element references a process_state element that specifies the process information to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>process_test</oval:test> <oval:object>process_object</oval:object> <oval:state>process_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">process_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.8</oval:version> <oval:reason>The process_test has been deprecated and replaced by the process58_test. The command line of a process cannot be used to uniquely identify a process. As a result, the pid entity was added to the process58_object. Please see the process58_test for additional information.</oval:reason> </oval:deprecated_info> <sch:pattern id="win-def_processtst_dep"> <sch:rule context="win-def:process_test"> <sch:report test="true()">DEPRECATED TEST: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_processtst"> <sch:rule context="win-def:process_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:process_object/@id"><sch:value-of select="../@id"/> - the object child element of a process_test must reference a process_object</sch:assert> </sch:rule> <sch:rule context="win-def:process_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:process_state/@id"><sch:value-of select="../@id"/> - the state child element of a process_test must reference a process_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="process_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The process_object element is used by a process test to define the specific process(es) to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>A process_object defines the command line used to start the process(es).</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.8</oval:version> <oval:reason>The process_object has been deprecated and replaced by the process58_object. The command line of a process cannot be used to uniquely identify a process. As a result, the pid entity was added to the process58_object. Please see the process58_object for additional information.</oval:reason> </oval:deprecated_info> <sch:pattern id="win-def_processobj_dep"> <sch:rule context="win-def:process_object"> <sch:report test="true()">DEPRECATED OBJECT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:element name="command_line" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The command_line entity is the string used to start the process. This includes any parameters that are part of the command line.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="process_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The process_state element defines the different metadata associate with a Windows process. This includes the command line, pid, ppid, image path, and current directory. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.8</oval:version> <oval:reason>The process_state has been deprecated and replaced by the process58_state. The command line of a process cannot be used to uniquely identify a process. As a result, the pid entity was added to the process58_object. Please see the process58_state for additional information.</oval:reason> </oval:deprecated_info> <sch:pattern id="win-def_processste_dep"> <sch:rule context="win-def:process_state"> <sch:report test="true()">DEPRECATED STATE: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="command_line" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The command_line entity is the string used to start the process. This includes any parameters that are part of the command line.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="pid" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The id given to the process that is created for a specified command line.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="ppid" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The id given to the parent of the process that is created for the specified command line</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="priority" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The base priority of the process.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_path" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The image_path entity contains the name of the executable file in question.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="current_dir" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The current_directory entity represents the current path to the executable.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ============================ PROCESS TEST (58) ============================== --> <!-- =============================================================================== --> <xsd:element name="process58_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The process58_test is used to check information found in the Windows processes. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a process58_object and the optional state element references a process58_state element that specifies the process information to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>process58_test</oval:test> <oval:object>process58_object</oval:object> <oval:state>process58_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">process_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_process58tst"> <sch:rule context="win-def:process58_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:process58_object/@id"><sch:value-of select="../@id"/> - the object child element of a process58_test must reference a process58_object</sch:assert> </sch:rule> <sch:rule context="win-def:process58_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:process58_state/@id"><sch:value-of select="../@id"/> - the state child element of a process58_test must reference a process58_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="process58_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The process58_object element is used by a process58_test to define the specific process(es) to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>A process58_object defines the command line used to start the process(es)and pid.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_process58_object_verify_filter_state"> <sch:rule context="win-def:process58_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:process58_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='process58_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="command_line" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The command_line entity is the string used to start the process. This includes any parameters that are part of the command line.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="pid" type="oval-def:EntityObjectIntType"> <xsd:annotation> <xsd:documentation>The id given to the process that is created for a specified command line.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="process58_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The process58_state element defines the different metadata associate with a Windows process. This includes the command line, pid, ppid, image path, and current directory. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="command_line" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The command_line entity is the string used to start the process. This includes any parameters that are part of the command line.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="pid" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The id given to the process that is created for a specified command line.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="ppid" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The id given to the parent of the process that is created for the specified command line</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="priority" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The base priority of the process.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="image_path" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The image_path entity represents the name of the executable file for the process.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="current_dir" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The current_dir entity represents the current path to the executable file for the process.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="creation_time" type="oval-def:EntityStateIntType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The creation_time entity represents the creation time of the process. The value of this entity represents the FILETIME structure which is a 64-bit value representing the number of 100-nanosecond intervals since January 1, 1601 (UTC). See the GetProcessTimes function lpCreationTime.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="dep_enabled" type="oval-def:EntityStateBoolType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The dep_enabled entity represents whether or not data execution prevention (DEP) is enabled. See the GetProcessDEPPolicy lpFlags.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="primary_window_text" type="oval-def:EntityStateStringType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The primary_window_text entity represents the title of the primary window of the process. See the GetWindowText function.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="name" type="oval-def:EntityStateStringType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The name of the process.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- =============================== REGISTRY TEST =============================== --> <!-- =============================================================================== --> <xsd:element name="registry_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The registry test is used to check metadata associated with Windows registry key. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a registry_object and the optional state element specifies the registry data to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>registry_test</oval:test> <oval:object>registry_object</oval:object> <oval:state>registry_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">registry_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_regtst"> <sch:rule context="win-def:registry_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:registry_object/@id"><sch:value-of select="../@id"/> - the object child element of a registry_test must reference a registry_object</sch:assert> </sch:rule> <sch:rule context="win-def:registry_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:registry_state/@id"><sch:value-of select="../@id"/> - the state child element of a registry_test must reference a registry_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="registry_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation/> <xsd:appinfo> <sch:pattern id="win-def_registry_object_verify_filter_state"> <sch:rule context="win-def:registry_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:registry_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='registry_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:RegistryBehaviors" minOccurs="0"/> <xsd:element name="hive" type="win-def:EntityObjectRegistryHiveType"> <xsd:annotation> <xsd:documentation>The hive that the registry key belongs to. This is restricted to a specific set of values: HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, and HKEY_USERS.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The key element describes a registry key to be collected. Note that the hive portion of the string should not be included, as this data should be found under the hive element. If the xsi:nil attribute is set to true, then the object being specified is the higher level hive. In this case, the key element should not be collected or used in analysis. Setting xsi:nil equal to true is different than using a .* pattern match. A .* pattern match says to collect every key under a given hive.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_regobjkey2"> <sch:rule context="win-def:registry_object/win-def:key[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth])"><sch:value-of select="../@id"/> - the max_depth behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_direction])"><sch:value-of select="../@id"/> - the recurse_direction behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="name" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The name element describes the name assigned to a value associated with a specific registry key. If an empty string is specified for the name element, the registry key's default value should be collected. If the xsi:nil attribute is set to true, then the object being specified is the higher level hive/key. In this case, the name element should not be collected or used in analysis. Setting xsi:nil equal to true on an element is different than using a .* pattern match. A .* pattern match says to collect every name under a given hive/key. The most likely use for xsi:nil within a registry object is when checking for the existence of a particular key, without regards to the different names associated with it.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="registry_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The registry_state element defines the different metadata associate with a Windows registry key. This includes the hive, key, name, type, and value. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="hive" type="win-def:EntityStateRegistryHiveType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The hive that the registry key belongs to. This is restricted to a specific set of values: HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, and HKEY_USERS.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element describes a registry key to be tested. Note that the hive portion of the string should not be inclueded, as this data should be found under the hive element.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element describes the name of a value of a registry key. If the xsi:nil attribute is set to true, then the name element should not be used in analysis.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="last_write_time" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The last time that the key or any of its value entries were modified. The value of this entity represents the FILETIME structure which is a 64-bit value representing the number of 100-nanosecond intervals since January 1, 1601 (UTC). Last write time can be queried on any key, with hives being classified as a type of key. When collecting only information about a registry hive or key the last write time will be the time the key or any of its entries were modified. When collecting only information about a registry name the last write time will be the time the containing key was modified. Thus when collecting information about a registry name, the last write time does not correlate directly to the specified name. See the RegQueryInfoKey function lpftLastWriteTime.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="type" type="win-def:EntityStateRegistryTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The type entity allows a test to be written against the registy type associated with the specified registry key(s). Please refer to the documentation on the EntityStateRegistryTypeType for more information about the different valid individual types.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="value" type="oval-def:EntityStateAnySimpleType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The value entity allows a test to be written against the value held within the specified registry key(s). If the value being tested is of type REG_BINARY, then the datatype attribute should be set to 'binary' and the data represented by the value entity should follow the xsd:hexBinary form. (each binary octet is encoded as two hex digits) If the value being tested is of type REG_DWORD, REG_QWORD, REG_DWORD_LITTLE_ENDIAN, REG_DWORD_BIG_ENDIAN, and REG_QWORD_LITTLE_ENDIAN then the datatype attribute should be set to 'int' and the value entity should represent the data as an unsigned integer. DWORD and QWORD values represnt unsigned 32-bit and 64-bit integers, respectively. If the value being tested is of type REG_EXPAND_SZ, then the datatype attribute should be set to 'string' and the pre-expanded string should be represented by the value entity. If the value being tested is of type REG_MULTI_SZ, then only a single string (one of the multiple strings) should be tested using the value entity with the datatype attribute set to 'string'. In order to test multiple values, multiple OVAL registry tests should be used. If the specified registry key is of type REG_SZ, then the datatype should be 'string' and the value entity should be a copy of the string. If the value being tested is of type REG_LINK, then the datatype attribute should be set to 'string' and the null-terminated Unicode string should be represented by the value entity.</xsd:documentation> <xsd:documentation>Note that if the intent is to test a version number held in the registry (as a reg_sz) then instead of setting the datatype to 'string', the datatype can be set to 'version'. This allows tools performing the evaluation to know how to perform less than and greater than operations correctly.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="windows_view" type="win-def:EntityStateWindowsViewType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The windows view value to which this was targeted. This is used to indicate which view (32-bit or 64-bit), the associated State applies to.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="RegistryBehaviors"> <xsd:annotation> <xsd:documentation>The RegistryBehaviors complex type defines a number of behaviors that allow a more detailed definition of the registry_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> </xsd:annotation> <xsd:attribute name="max_depth" use="optional" default="-1"> <xsd:annotation> <xsd:documentation>'max_depth' defines the maximum depth of recursion to perform when a recurse_direction is specified. A value of '0' is equivalent to no recursion, '1' means to step only one directory level up/down, and so on. The default value is '-1' meaning no limitation. For a 'max_depth' of -1 or any value of 1 or more the starting key must be considered in the recursive search.</xsd:documentation> <xsd:documentation>Note that the default recurse_direction behavior is 'none' so even though max_depth specifies no limitation by default, the recurse_direction behavior turns recursion off.</xsd:documentation> <xsd:documentation>Note that this behavior only applies with the equality operation on the key entity.</xsd:documentation> </xsd:annotation> <xsd:simpleType> <xsd:restriction base="xsd:integer"> <xsd:fractionDigits value="0"/> <xsd:minInclusive value="-1"/> </xsd:restriction> </xsd:simpleType> </xsd:attribute> <xsd:attribute name="recurse_direction" use="optional" default="none"> <xsd:annotation> <xsd:documentation>'recurse_direction' defines the direction, either 'up' to parent keys, or 'down' into child keys to recursively search for registry keys. When recursing up or down, one is limited by the max_depth behavior. Note that it is not an error if max_depth specifies a certain level of recursion and that level does not exist. Recursing should only go as deep as available. The default value is 'none' for no recursion.</xsd:documentation> <xsd:documentation>Note that this behavior only applies with the equality operation on the key entity.</xsd:documentation> </xsd:annotation> <xsd:simpleType> <xsd:restriction base="xsd:string"> <xsd:enumeration value="none"/> <xsd:enumeration value="up"/> <xsd:enumeration value="down"/> </xsd:restriction> </xsd:simpleType> </xsd:attribute> <xsd:attribute name="windows_view" use="optional" default="64_bit"> <xsd:annotation> <xsd:documentation>64-bit versions of Windows provide an alternate file system and registry views to 32-bit applications. This behavior allows the OVAL Object to specify which view should be examined. This behavior only applies to 64-bit Windows, and must not be applied on other platforms. </xsd:documentation> <xsd:documentation>Note that the values have the following meaning: '64_bit' - Indicates that the 64-bit view on 64-bit Windows operating systems must be examined. On a 32-bit system, the Object must be evaluated without applying the behavior. '32_bit' - Indicates that the 32-bit view must be examined. On a 32-bit system, the Object must be evaluated without applying the behavior. It is recommended that the corresponding 'windows_view' entity be set on the OVAL Items that are collected when this behavior is used to distinguish between the OVAL Items that are collected in the 32-bit or 64-bit views.</xsd:documentation> </xsd:annotation> <xsd:simpleType> <xsd:restriction base="xsd:string"> <xsd:enumeration value="32_bit"/> <xsd:enumeration value="64_bit"/> </xsd:restriction> </xsd:simpleType> </xsd:attribute> </xsd:complexType> <!-- =============================================================================== --> <!-- =================== REGKEY AUDITED PERMISSIONS TEST (53) ==================== --> <!-- =============================================================================== --> <xsd:element name="regkeyauditedpermissions53_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The registry key audited permissions test is used to check the audit permissions associated with Windows registry keys. Note that the trustee's audited permissions are the audit permissons that the SACL grants to the trustee or to any groups of which the trustee is a member. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a regkeyauditedpermissions53_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>regkeyauditedpermissions53_test</oval:test> <oval:object>regkeyauditedpermissions53_object</oval:object> <oval:state>regkeyauditedpermissions53_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">regkeyauditedpermissions_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_rap53tst"> <sch:rule context="win-def:regkeyauditedpermissions53_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:regkeyauditedpermissions53_object/@id"><sch:value-of select="../@id"/> - the object child element of a regkeyauditedpermissions53_test must reference a regkeyauditedpermissions53_object</sch:assert> </sch:rule> <sch:rule context="win-def:regkeyauditedpermissions53_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:regkeyauditedpermissions53_state/@id"><sch:value-of select="../@id"/> - the state child element of a regkeyauditedpermissions53_test must reference a regkeyauditedpermissions53_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="regkeyauditedpermissions53_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The regkeyauditedpermissions53_object element is used by a registry key audited permissions test to define the objects used to evalutate against the specified state. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic.</xsd:documentation> <xsd:documentation>A regkeyauditedpermissions53_object is defined as a combination of a Windows registry key and trustee name. The hive and key elements represents the registry key to be evaluated while the trustee name represents the account (SID) to check audited permissions of. If multiple keys or SIDs are matched by either reference, then each possible combination of registry key and SID is a matching registry key audited permissions object. In addition, a number of behaviors may be provided that help guide the collection of objects. Please refer to the RegkeyAuditPermissions53Behaviors complex type for more information about specific behaviors.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_regkeyauditedpermissions53_object_verify_filter_state"> <sch:rule context="win-def:regkeyauditedpermissions53_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:regkeyauditedpermissions53_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='regkeyauditedpermissions53_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:RegkeyAuditPermissions53Behaviors" minOccurs="0"/> <xsd:element name="hive" type="win-def:EntityObjectRegistryHiveType"> <xsd:annotation> <xsd:documentation>The hive that the registry key belongs to. This is restricted to a specific set of values: HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, and HKEY_USERS.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The key element describes a registry key to be collected. Note that the hive portion of the string should not be included, as this data should be found under the hive element. If the xsi:nil attribute is set to true, then the object being specified is the higher level hive. In this case, the key element should not be collected or used in analysis. Setting xsi:nil equal to true is different than using a .* pattern match. A .* pattern match says to collect every key under a given hive.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_regkeyauditedpermissions53_objectkey"> <sch:rule context="win-def:regkeyauditedpermissions53_object/win-def:key[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth])"><sch:value-of select="../@id"/> - the max_depth behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_direction])"><sch:value-of select="../@id"/> - the recurse_direction behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_sid entity identifies a unique SID associated with a user, group, system, or program (such as a Windows service). If an operation other than equals is used to identify matching trustees (i.e. not equal, or a pattern match) then the resulting matches shall be limited to only the trustees referenced in the registry key's Security Descriptor. The scope is limited here to avoid unnecessarily resource intensive searches for trustees. Note that the larger scope of all known trustees may be obtained through the use of variables.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="regkeyauditedpermissions53_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The regkeyauditedpermissions53_state element defines the different audit permissions that can be associated with a given regkeyauditedpermissions53_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="hive" type="win-def:EntityStateRegistryHiveType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the hive of a registry key on the machine from which to retrieve the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies a registry key on the machine from which to retrieve the SACL. Note that the hive portion of the string should not be inclueded, as this data should be found under the hive element.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The trustee_sid element is the unique SID that associated a user, group, system, or program (such as a Windows service).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>This entity has been deprecated because registry keys do not support the SYNCHRONIZE standard access right.</oval:reason> </oval:deprecated_info> <sch:pattern id="win-def_rap53stestandard_synchronize"> <sch:rule context="win-def:regkeyauditedpermissions53_state/win-def:standard_synchronize"> <sch:report test="true()">DEPRECATED ELEMENT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key_query_value" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_set_value" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_create_sub_key" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_enumerate_sub_keys" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_notify" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_create_link" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_64key" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_32key" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_res" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="windows_view" type="win-def:EntityStateWindowsViewType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The windows view value to which this was targeted. This is used to indicate which view (32-bit or 64-bit), the associated State applies to.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="RegkeyAuditPermissions53Behaviors"> <xsd:annotation> <xsd:documentation>The RegkeyAuditPermissions53Behaviors complex type defines a number of behaviors that allow a more detailed definition of the registrykeyauditedpermissions53_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> <xsd:documentation>The RegkeyAuditPermissions53Behaviors extend the win-def:RegistryBehaviors and therefore include the behaviors defined by that type.</xsd:documentation> </xsd:annotation> <xsd:complexContent> <xsd:extension base="win-def:RegistryBehaviors"> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group SID should be included in the object when the object is defined by a group SID. For example, the intent of an object defined by a group SID might be to retrieve all the user SIDs that are a member of the group, but not the group SID itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rka53_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:regkeyauditedpermissions53_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:regkeyauditedpermissions53_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>The 'resolve_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to resolve the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rka53_resolve_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:regkeyauditedpermissions53_object/win-def:behaviors"> <sch:report test="@resolve_group">DEPRECATED BEHAVIOR IN: regkeyauditedpermissions53_object </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:extension> </xsd:complexContent> </xsd:complexType> <!-- =============================================================================== --> <!-- =============== REGKEY AUDITED PERMISSIONS TEST (deprecated) ================ --> <!-- =============================================================================== --> <xsd:element name="regkeyauditedpermissions_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The registry key audited permissions test is used to check the audit permissions associated with Windows registry keys. Note that the trustee's audited permissions are the audit permissons that the SACL grants to the trustee or to any groups of which the trustee is a member. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a regkeyauditedpermissions_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>regkeyauditedpermissions_test</oval:test> <oval:object>regkeyauditedpermissions_object</oval:object> <oval:state>regkeyauditedpermissions_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">regkeyauditedpermissions_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the regkeyauditedpermissions53_test. This test uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new test was created to use trustee SIDs, which are unique. See the regkeyauditedpermissions53_test.</oval:reason> <oval:comment>This test has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_raptst_dep"> <sch:rule context="win-def:regkeyauditedpermissions_test"> <sch:report test="true()">DEPRECATED TEST: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_raptst"> <sch:rule context="win-def:regkeyauditedpermissions_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:regkeyauditedpermissions_object/@id"><sch:value-of select="../@id"/> - the object child element of a regkeyauditedpermissions_test must reference a regkeyauditedpermissions_object</sch:assert> </sch:rule> <sch:rule context="win-def:regkeyauditedpermissions_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:regkeyauditedpermissions_state/@id"><sch:value-of select="../@id"/> - the state child element of a regkeyauditedpermissions_test must reference a regkeyauditedpermissions_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="regkeyauditedpermissions_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The regkeyauditedpermissions_object element is used by a registry key audited permissions test to define the objects used to evalutate against the specified state. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic.</xsd:documentation> <xsd:documentation>A regkeyauditedpermissions_object is defined as a combination of a Windows registry key and trustee name. The hive and key elements represents the registry key to be evaluated while the trustee name represents the account (SID) to check audited permissions of. If multiple keys or SIDs are matched by either reference, then each possible combination of file and SID is a matching file audited permissions object. In addition, a number of behaviors may be provided that help guide the collection of objects. Please refer to the RegkeyAuditPermissionsBehaviors complex type for more information about specific behaviors.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the regkeyauditedpermissions53_object. This object uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new object was created to use trustee SIDs, which are unique. See the regkeyauditedpermissions53_object.</oval:reason> <oval:comment>This object has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rapobj_dep"> <sch:rule context="win-def:regkeyauditedpermissions_object"> <sch:report test="true()">DEPRECATED OBJECT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:RegkeyAuditPermissionsBehaviors" minOccurs="0"/> <xsd:element name="hive" type="win-def:EntityObjectRegistryHiveType"> <xsd:annotation> <xsd:documentation>The hive that the registry key belongs to. This is restricted to a specific set of values: HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, and HKEY_USERS.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The key element describes a registry key to be collected. Note that the hive portion of the string should not be included, as this data should be found under the hive element.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_regkeyauditedpermissions_objectkey"> <sch:rule context="win-def:regkeyauditedpermissions_object/win-def:key[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth])"><sch:value-of select="../@id"/> - the max_depth behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_direction])"><sch:value-of select="../@id"/> - the recurse_direction behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="trustee_name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_name element is the unique name that associated a particular SID. A SID can be associated with a user, group, or program (such as a Windows service). In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="regkeyauditedpermissions_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The regkeyauditedpermissions_state element defines the different audit permissions that can be associated with a given regkeyauditedpermissions_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the regkeyauditedpermissions53_state. This state uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new state was created to use trustee SIDs, which are unique. See the regkeyauditedpermissions53_state.</oval:reason> <oval:comment>This state has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rapste_dep"> <sch:rule context="win-def:regkeyauditedpermissions_state"> <sch:report test="true()">DEPRECATED STATE: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="hive" type="win-def:EntityStateRegistryHiveType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the hive of a registry key on the machine from which to retrieve the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies a registry key on the machine from which to retrieve the SACL. Note that the hive portion of the string should not be inclueded, as this data should be found under the hive element.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The unique name associated with a particular security identifier (SID). In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key_query_value" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_set_value" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_create_sub_key" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_enumerate_sub_keys" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_notify" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_create_link" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_64key" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_32key" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_res" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="windows_view" type="win-def:EntityStateWindowsViewType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The windows view value to which this was targeted. This is used to indicate which view (32-bit or 64-bit), the associated State applies to.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="RegkeyAuditPermissionsBehaviors"> <xsd:annotation> <xsd:documentation>The RegkeyAuditPermissionsBehaviors complex type defines a number of behaviors that allow a more detailed definition of the registrykeyauditedpermissions_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> <xsd:documentation>The RegkeyAuditPermissionsBehaviors extend the win-def:RegistryBehaviors and therefore include the behaviors defined by that type.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the RegkeyAuditPermissionsBehaviors53. The RegkeyAuditPermissionsBehaviors complex type is used by the regkeyauditedpermissions_test which uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new test was created to use trustee SIDs, which are unique. This new test utilizes the RegkeyAuditPermissionsBehaviors53 complex type, and as a result, the RegkeyAuditPermissionsBehaviors complex type is no longer needed.</oval:reason> <oval:comment>This complex type has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> </xsd:appinfo> </xsd:annotation> <xsd:complexContent> <xsd:extension base="win-def:RegistryBehaviors"> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group trustee name should be included in the object when the object is defined by a group trustee name. For example, the intent of an object defined by a group trustee name might be to retrieve all the user trustee names that are members of the group, but not the group trustee name itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rka_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:regkeyauditedpermissions_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:regkeyauditedpermissions_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>The 'resolve_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_object or similar to resolve the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rka_resolve_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:regkeyauditedpermissions_object/win-def:behaviors"> <sch:report test="@resolve_group">DEPRECATED BEHAVIOR IN: regkeyauditedpermissions_object </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:extension> </xsd:complexContent> </xsd:complexType> <!-- =============================================================================== --> <!-- ==================== REGKEY EFFECTIVE RIGHTS TEST (53) ====================== --> <!-- =============================================================================== --> <xsd:element name="regkeyeffectiverights53_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The registry key effective rights test is used to check the effective rights associated with Windows files. Note that the trustee's effective access rights are the access rights that the DACL grants to the trustee or to any groups of which the trustee is a member. The regkeyeffectiverights53_test element extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a regkeyeffectiverights53_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>regkeyeffectiverights53_test</oval:test> <oval:object>regkeyeffectiverights53_object</oval:object> <oval:state>regkeyeffectiverights53_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">regkeyeffectiverights_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_rer53tst"> <sch:rule context="win-def:regkeyeffectiverights53_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:regkeyeffectiverights53_object/@id"><sch:value-of select="../@id"/> - the object child element of a regkeyeffectiverights53_test must reference a regkeyeffectiverights53_object</sch:assert> </sch:rule> <sch:rule context="win-def:regkeyeffectiverights53_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:regkeyeffectiverights53_state/@id"><sch:value-of select="../@id"/> - the state child element of a regkeyeffectiverights53_test must reference a regkeyeffectiverights53_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="regkeyeffectiverights53_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The regkeyeffectiverights53_object element is used by a registry key effective rights test to define the objects used to evalutate against the specified state. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic.</xsd:documentation> <xsd:documentation>A regkeyeffectiverights53_object is defined as a combination of a Windows registry and trustee SID. The key entity represents the registry key to be evaluated while the trustee SID represents the account (SID) to check effective rights of. If multiple files or SIDs are matched by either reference, then each possible combination of registry key and SID is a matching registry key effective rights object. In addition, a number of behaviors may be provided that help guide the collection of objects. Please refer to the RegkeyEffectiveRights53Behaviors complex type for more information about specific behaviors.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_regkeyeffectiverights53_object_verify_filter_state"> <sch:rule context="win-def:regkeyeffectiverights53_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:regkeyeffectiverights53_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='regkeyeffectiverights53_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:RegkeyEffectiveRights53Behaviors" minOccurs="0"/> <xsd:element name="hive" type="win-def:EntityObjectRegistryHiveType"> <xsd:annotation> <xsd:documentation>The hive that the registry key belongs to. This is restricted to a specific set of values: HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, and HKEY_USERS.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key" type="oval-def:EntityObjectStringType" nillable="true"> <xsd:annotation> <xsd:documentation>The key element describes a registry key to be collected. Note that the hive portion of the string should not be included, as this data should be found under the hive element. If the xsi:nil attribute is set to true, then the object being specified is the higher level hive. In this case, the key element should not be collected or used in analysis. Setting xsi:nil equal to true is different than using a .* pattern match. A .* pattern match says to collect every key under a given hive.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_regkeyeffectiverights53_objectkey"> <sch:rule context="win-def:regkeyeffectiverights53_object/win-def:key[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth])"><sch:value-of select="../@id"/> - the max_depth behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_direction])"><sch:value-of select="../@id"/> - the recurse_direction behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_sid entity identifies a unique SID associated with a user, group, system, or program (such as a Windows service). If an operation other than equals is used to identify matching trustees (i.e. not equal, or a pattern match) then the resulting matches shall be limited to only the trustees referenced in the registry key's Security Descriptor. The scope is limited here to avoid unnecessarily resource intensive searches for trustees. Note that the larger scope of all known trustees may be obtained through the use of variables.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="regkeyeffectiverights53_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The regkeyeffectiverights53_state element defines the different rights that can be associated with a given regkeyeffectiverights53_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="hive" type="win-def:EntityStateRegistryHiveType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the hive of a registry key on the machine from which to retrieve the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies a registry key on the machine from which to retrieve the SACL. Note that the hive portion of the string should not be inclueded, as this data should be found under the hive element.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The trustee_sid element is the unique SID that associated a user, group, system, or program (such as a Windows service).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>This entity has been deprecated because registry keys do not support the SYNCHRONIZE standard access right.</oval:reason> </oval:deprecated_info> <sch:pattern id="win-def_rer53stestandard_synchronize"> <sch:rule context="win-def:regkeyeffectiverights53_state/win-def:standard_synchronize"> <sch:report test="true()">DEPRECATED ELEMENT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key_query_value" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_set_value" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_create_sub_key" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_enumerate_sub_keys" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_notify" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_create_link" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_64key" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_32key" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_res" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="windows_view" type="win-def:EntityStateWindowsViewType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The windows view value to which this was targeted. This is used to indicate which view (32-bit or 64-bit), the associated State applies to.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="RegkeyEffectiveRights53Behaviors"> <xsd:annotation> <xsd:documentation>The RegkeyEffectiveRights53Behaviors complex type defines a number of behaviors that allow a more detailed definition of the registrykeyeffectiverights53_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> <xsd:documentation>The RegkeyEffectiveRights53Behaviors extend the win-def:RegistryBehaviors and therefore include the behaviors defined by that type.</xsd:documentation> </xsd:annotation> <xsd:complexContent> <xsd:extension base="win-def:RegistryBehaviors"> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group SID should be included in the object when the object is defined by a group SID. For example, the intent of an object defined by a group SID might be to retrieve all the user SIDs that are a member of the group, but not the group SID itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rke53_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:regkeyeffectiverights53_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:regkeyeffectiverights53_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>The 'resolve_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to resolve the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rke53_resolve_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:regkeyeffectiverights53_object/win-def:behaviors"> <sch:report test="@resolve_group">DEPRECATED BEHAVIOR IN: regkeyeffectiverights53_object </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:extension> </xsd:complexContent> </xsd:complexType> <!-- =============================================================================== --> <!-- ================ REGKEY EFFECTIVE RIGHTS TEST (deprecated) ================== --> <!-- =============================================================================== --> <xsd:element name="regkeyeffectiverights_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The registry key effective rights test is used to check the effective rights associated with Windows files. Note that the trustee's effective access rights are the access rights that the DACL grants to the trustee or to any groups of which the trustee is a member. The regkeyeffectiverights_test element extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a regkeyeffectiverights_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>regkeyeffectiverights_test</oval:test> <oval:object>regkeyeffectiverights_object</oval:object> <oval:state>regkeyeffectiverights_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">regkeyeffectiverights_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the regkeyeffectiverights53_test. This test uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new test was created to use trustee SIDs, which are unique. See the regkeyeffectiverights53_test.</oval:reason> <oval:comment>This test has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rertst_dep"> <sch:rule context="win-def:regkeyeffectiverights_test"> <sch:report test="true()">DEPRECATED TEST: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_rertst"> <sch:rule context="win-def:regkeyeffectiverights_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:regkeyeffectiverights_object/@id"><sch:value-of select="../@id"/> - the object child element of a regkeyeffectiverights_test must reference a regkeyeffectiverights_object</sch:assert> </sch:rule> <sch:rule context="win-def:regkeyeffectiverights_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:regkeyeffectiverights_state/@id"><sch:value-of select="../@id"/> - the state child element of a regkeyeffectiverights_test must reference a regkeyeffectiverights_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="regkeyeffectiverights_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the regkeyeffectiverights53_object. This object uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new object was created to use trustee SIDs, which are unique. See the regkeyeffectiverights53_object.</oval:reason> <oval:comment>This object has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rerobj_dep"> <sch:rule context="win-def:regkeyeffectiverights_object"> <sch:report test="true()">DEPRECATED OBJECT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:RegkeyEffectiveRightsBehaviors" minOccurs="0"/> <xsd:element name="hive" type="win-def:EntityObjectRegistryHiveType"> <xsd:annotation> <xsd:documentation>The hive that the registry key belongs to. This is restricted to a specific set of values: HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, and HKEY_USERS.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The key element describes a registry key to be collected. Note that the hive portion of the string should not be included, as this data should be found under the hive element.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_regkeyeffectiverights_objectkey"> <sch:rule context="win-def:regkeyeffectiverights_object/win-def:key[not(@operation='equals' or not(@operation))]"> <sch:assert test="not(preceding-sibling::win-def:behaviors[@max_depth])"><sch:value-of select="../@id"/> - the max_depth behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> <sch:assert test="not(preceding-sibling::win-def:behaviors[@recurse_direction])"><sch:value-of select="../@id"/> - the recurse_direction behavior MUST not be used when a pattern match is used with a key entity.</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="trustee_name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_name element is the unique name that associated a particular SID. A SID can be associated with a user, group, or program (such as a Windows service). In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="regkeyeffectiverights_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The regkeyeffectiverights_state element defines the different rights that can be associated with a given regkeyeffectiverights_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the regkeyeffectiverights53_state. This state uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new state was created to use trustee SIDs, which are unique. See the regkeyeffectiverights53_state.</oval:reason> <oval:comment>This state has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rerste_dep"> <sch:rule context="win-def:regkeyeffectiverights_state"> <sch:report test="true()">DEPRECATED STATE: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="hive" type="win-def:EntityStateRegistryHiveType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the hive of a registry key on the machine from which to retrieve the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies a registry key on the machine from which to retrieve the SACL. Note that the hive portion of the string should not be inclueded, as this data should be found under the hive element.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The unique name associated with a particular security identifier (SID). In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="key_query_value" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_set_value" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_create_sub_key" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_enumerate_sub_keys" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_notify" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_create_link" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_64key" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_32key" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="key_wow64_res" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> </xsd:element> <xsd:element name="windows_view" type="win-def:EntityStateWindowsViewType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The windows view value to which this was targeted. This is used to indicate which view (32-bit or 64-bit), the associated State applies to.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="RegkeyEffectiveRightsBehaviors"> <xsd:annotation> <xsd:documentation>The RegkeyEffectiveRightsBehaviors complex type defines a number of behaviors that allow a more detailed definition of the registrykeyeffectiverights_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> <xsd:documentation>The RegkeyEffectiveRightsBehaviors extend the win-def:RegistryBehaviors and therefore include the behaviors defined by that type.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.3</oval:version> <oval:reason>Replaced by the RegkeyEffectiveRightsBehaviors53. The RegkeyEffectiveRightsBehaviors complex type is used by the regkeyeffectiverights_test which uses a trustee_name element for identifying trustees. Trustee names are not unique, and a new test was created to use trustee SIDs, which are unique. This new test utilizes the RegkeyEffectiveRightsBehaviors53 complex type, and as a result, the RegkeyEffectiveRightsBehaviors complex type is no longer needed.</oval:reason> <oval:comment>This complex type has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> </xsd:appinfo> </xsd:annotation> <xsd:complexContent> <xsd:extension base="win-def:RegistryBehaviors"> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group trustee name should be included in the object when the object is defined by a group trustee name. For example, the intent of an object defined by a group trustee name might be to retrieve all the user trustee names that are members of the group, but not the group trustee name itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rke_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:regkeyeffectiverights_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:regkeyeffectiverights_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>The 'resolve_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to resolve the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_rke_resolve_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:regkeyeffectiverights_object/win-def:behaviors"> <sch:report test="@resolve_group">DEPRECATED BEHAVIOR IN: regkeyeffectiverights_object </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:extension> </xsd:complexContent> </xsd:complexType> <!-- =============================================================================== --> <!-- =============================== SERVICE TEST ================================ --> <!-- =============================================================================== --> <xsd:element name="service_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The service_test is used to check metadata associated with Windows services. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a service_object and the optional state elements specify the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>service_test</oval:test> <oval:object>service_object</oval:object> <oval:state>service_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">service_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_servicetst"> <sch:rule context="win-def:service_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:service_object/@id"><sch:value-of select="../@id"/> - the object child element of a service_test must reference a service_object</sch:assert> </sch:rule> <sch:rule context="win-def:service_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:service_state/@id"><sch:value-of select="../@id"/> - the state child element of a service_test must reference a service_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="service_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The service_object element is used by a service_test to define the specific service(s) to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_service_object_verify_filter_state"> <sch:rule context="win-def:service_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:service_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='service_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="service_name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The service_name element specifies the service name as stored in the Service Control Manager (SCM) database on the system.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="service_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The service_state element defines the different metadata associated with a Windows service. This includes the service name, display name, description, type, start type, current state, controls accepted, start name, path, pid, service flag, and dependencies. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="service_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The service_name element specifies the name of the service as specified in the Service Control Manager (SCM) database.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="display_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The display_name element specifies the name of the service as specified in tools such as Control Panel->Administrative Tools->Services.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="description" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The description element specifies the description of the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_type" type="win-def:EntityStateServiceTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The service_type element specifies the type of the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="start_type" type="win-def:EntityStateServiceStartTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The start_type element specifies when the service should be started.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="current_state" type="win-def:EntityStateServiceCurrentStateType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The current_state element specifies the current state of the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="controls_accepted" type="win-def:EntityStateServiceControlsAcceptedType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The controls_accepted element specifies the control codes that a service will accept and process.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="start_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The start_name element specifies the account under which the process should run.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="path" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The path element specifies the path to the binary of the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="pid" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The pid element specifies the process ID of the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_flag" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The service_flag element specifies if the service is in a system process that must always run (1) or if the service is in a non-system process or is not running (0). If the service is not running, the pid will be 0. Otherwise, the pid will be non-zero.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="dependencies" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The dependencies element specifies the dependencies of this service on other services.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ================ SERVICE EFFECTIVE RIGHTS TEST =============================== --> <!-- =============================================================================== --> <xsd:element name="serviceeffectiverights_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The service effective rights test is used to check the effective rights associated with Windows services. Note that the trustee's effective access rights are the access rights that the DACL grants to the trustee or to any groups of which the trustee is a member. The serviceeffectiverights_test element extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a serviceeffectiverights_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>serviceeffectiverights_test</oval:test> <oval:object>serviceeffectiverights_object</oval:object> <oval:state>serviceeffectiverights_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">serviceeffectiverights_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_svcertst"> <sch:rule context="win-def:serviceeffectiverights_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:serviceeffectiverights_object/@id"><sch:value-of select="../@id"/> - the object child element of a serviceeffectiverights_test must reference a serviceeffectiverights_object</sch:assert> </sch:rule> <sch:rule context="win-def:serviceeffectiverights_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:serviceeffectiverights_state/@id"><sch:value-of select="../@id"/> - the state child element of a serviceeffectiverights_test must reference a serviceeffectiverights_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="serviceeffectiverights_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The serviceeffectiverights_object element is used by the serviceeffectiverights_test to define the objects used to evalutate against the specified state. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic.</xsd:documentation> <xsd:documentation>A serviceeffectiverights_object is defined as a combination of a Windows service_name and trustee_sid. The service_name entity represents the service to be evaluated while the trustee_sid entity represents the account (SID) to check the effective rights of. If multiple services or SIDs are matched by either reference, then each possible combination of service and SID is a matching service effective rights object.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_serviceeffectiverights_object_verify_filter_state"> <sch:rule context="win-def:serviceeffectiverights_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:serviceeffectiverights_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='serviceeffectiverights_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="service_name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The service_name element describes a service to be collected. Note that the service_name element should contain the actual name of the service and not its display name that is found in Control Panel->Administrative Tools->Services. For example, if you wanted to check the effective rights of the Automatic Updates service you would specify 'wuauserv' for the service_name element not 'Automatic Updates'.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_sid entity identifies a set of SIDs associated with a user, group, system, or program (such as a Windows service). If an operation other than equals is used to identify matching trustees (i.e. not equal, or a pattern match) then the resulting matches shall be limited to only the trustees referenced in the service's Security Descriptor. The scope is limited here to avoid unnecessarily resource intensive searches for trustees. Note that the larger scope of all known trustees may be obtained through the use of variables.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="serviceeffectiverights_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The serviceeffectiverights_state element defines the different rights that can be associated with a given serviceeffectiverights_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:documentation>See http://support.microsoft.com/kb/914392 for more information.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="service_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The service_name element specifies a service on the machine from which to retrieve the DACL. Note that the service_name element should contain the actual name of the service and not its display name that is found in Control Panel->Administrative Tools->Services. For example, if you wanted to check the effective rights of the Automatic Updates service you would specify 'wuauserv' for the service_name element not 'Automatic Updates'.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The trustee_sid element is the unique SID that is associated with a user, group, system, or program (such as a Windows service).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the DeleteService function to delete the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the QueryServiceObjectSecurity function to query the Security Descriptor of the service object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the SetServiceObjectSecurity function to modify the DACL member of the service object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the SetServiceObjectSecurity function to modify the Owner and Group members of the service object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access (STANDARD_RIGHTS_READ, SERVICE_QUERY_CONFIG, SERVICE_QUERY_STATUS, SERVICE_INTERROGATE, SERVICE_ENUMERATE_DEPENDENTS).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access (STANDARD_RIGHTS_WRITE, SERVICE_CHANGE_CONFIG).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access (STANDARD_RIGHTS_EXECUTE, SERVICE_START, SERVICE_STOP, SERVICE_PAUSE_CONTINUE, SERVICE_USER_DEFINED_CONTROL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_query_conf" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the QueryServiceConfig and QueryServiceConfig2 functions to query the service configuration.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_change_conf" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the ChangeServiceConfig or ChangeServiceConfig2 function to change the service configuration.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_query_stat" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the QueryServiceStatusEx function to ask the service control manager about the status of the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_enum_dependents" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the EnumDependentServices function to enumerate all the services dependent on the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_start" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the StartService function to start the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_stop" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the ControlService function to stop the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_pause" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the ControlService function to pause or continue the service.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_interrogate" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the ControlService function to ask the service to report its status immediately.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="service_user_defined" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This permission is required to call the ControlService function to specify a user-defined control code.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- =========================== SHARED RESOURCE TEST =========================== --> <!-- =============================================================================== --> <xsd:element name="sharedresource_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The shared resource test is used to check properties associated with any shared resource on the system. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a sharedresource_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>sharedresource_test</oval:test> <oval:object>sharedresource_object</oval:object> <oval:state>sharedresource_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">sharedresource_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_srtst"> <sch:rule context="win-def:sharedresource_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:sharedresource_object/@id"><sch:value-of select="../@id"/> - the object child element of a sharedresource_test must reference a sharedresource_object</sch:assert> </sch:rule> <sch:rule context="win-def:sharedresource_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:sharedresource_state/@id"><sch:value-of select="../@id"/> - the state child element of a sharedresource_test must reference a sharedresource_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="sharedresource_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The sharedresource_object element is used by a shared resource test to define the object, in this case a shared resource, to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>An shared resource object consists of a single netname entity that identifies a specific shared resource.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_sharedresource_object_verify_filter_state"> <sch:rule context="win-def:sharedresource_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:sharedresource_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='sharedresource_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="netname" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The netname element is the unique name that is associated with a specific shared resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="sharedresource_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The sharedresource_state element defines the different metadata associated with a Windows shared resource. This includes the share type, permissions, and max uses. This state mirrors the SHARE_INFO_2 structure. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="netname" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the name associated with a particular shared resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="shared_type" type="win-def:EntityStateSharedResourceTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The type of the shared resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="max_uses" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The maximum number of concurrent connections that the shared resource can accommodate.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="current_uses" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The number of current connections to the resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="local_path" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The local path for the shared resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_read_permission" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Permission to read data from a resource and, by default, to execute the resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_write_permission" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Permission to write data to the resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_create_permission" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Permission to create an instance of the resource (such as a file); data can be written to the resource as the resource is created.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_exec_permission" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Permission to execute the resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_delete_permission" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Permission to delete the resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_atrib_permission" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Permission to modify the resource's attributes (such as the date and time when a file was last modified).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_perm_permission" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Permission to modify the permissions (read, write, create, execute, and delete) assigned to a resource for a user or application.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_all_permission" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Permission to read, write, create, execute, and delete resources, and to modify their attributes and permissions.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ================= SHARED RESOURCE AUDITED PERMISSIONS TEST ================= --> <!-- =============================================================================== --> <xsd:element name="sharedresourceauditedpermissions_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The shared resource audited permissions test is used to check the audit permissions associated with any shared resource on the system. Note that the trustee's audited permissions are the audit permissons that the SACL grants to the trustee or to any groups of which the trustee is a member. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a sharedresourceauditedpermissions_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>sharedresourceauditedpermissions_test</oval:test> <oval:object>sharedresourceauditedpermissions_object</oval:object> <oval:state>sharedresourceauditedpermissions_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">sharedresourceauditedpermissions_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_sraptst"> <sch:rule context="win-def:sharedresourceauditedpermissions_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:sharedresourceauditedpermissions_object/@id"><sch:value-of select="../@id"/> - the object child element of a sharedresourceauditedpermissions_test must reference a sharedresourceauditedpermissions_object</sch:assert> </sch:rule> <sch:rule context="win-def:sharedresourceauditedpermissions_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:sharedresourceauditedpermissions_state/@id"><sch:value-of select="../@id"/> - the state child element of a sharedresourceauditedpermissions_test must reference a sharedresourceauditedpermissions_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="sharedresourceauditedpermissions_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The sharedresourceauditedpermissions_object element is used by a shared resource audited permissions test to define the objects used to evaluate against the specified state. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic.</xsd:documentation> <xsd:documentation>A shared resource audited permissions object consists of a netname entity that identifies a specific shared resource and a trustee_sid entity that identifies a specific account (SID) to check the audited permissions of.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_sharedresourceauditedpermissions_object_verify_filter_state"> <sch:rule context="win-def:sharedresourceauditedpermissions_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:sharedresourceauditedpermissions_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='sharedresourceauditedpermissions_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:SharedResourceAuditedPermissionsBehaviors" minOccurs="0"/> <xsd:element name="netname" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The netname element is the unique name that is associated with a specific shared resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_sid entity identifies a unique SID associated with a user, group, system, or program (such as a Windows service). If an operation other than equals is used to identify matching trustees (i.e. not equal, or a pattern match) then the resulting matches shall be limited to only the trustees referenced in the file's Security Descriptor. The scope is limited here to avoid unnecessarily resource intensive searches for trustees. Note that the larger scope of all known trustees may be obtained through the use of variables.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="sharedresourceauditedpermissions_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The sharedresourceauditedpermissions_state element defines the different audited permissions that can be associated with a given sharedresourceauditedpermissions_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="netname" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the name associated with a particular shared resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The trustee_sid element is the unique SID that associated a user, group, system, or program (such as a Windows service).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="win-def:EntityStateAuditType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="SharedResourceAuditedPermissionsBehaviors"> <xsd:annotation> <xsd:documentation>The SharedResourceAuditedPermissionsBehaviors complex type defines a behavior that allows for a more detailed definition of the sharedresourceauditedpermissions_object being specified. Note that using this behavior may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> </xsd:annotation> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group SID should be included in the object when the object is defined by a group SID. For example, the intent of an object defined by a group SID might be to retrieve all the user SIDs that are a member of the group, but not the group SID itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10.1</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_sra_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:sharedresourceauditedpermissions_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:sharedresourceauditedpermissions_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:complexType> <!-- =============================================================================== --> <!-- ================== SHARED RESOURCE EFFECTIVE RIGHTS TEST =================== --> <!-- =============================================================================== --> <xsd:element name="sharedresourceeffectiverights_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The shared resource effective rights test is used to check the effective rights associated with any shared resource on the system. Note that the trustee's effective access rights are the access rights that the DACL grants to the trustee or to any groups of which the trustee is a member. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a sharedresourceeffectiverights_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>sharedresourceeffectiverights_test</oval:test> <oval:object>sharedresourceeffectiverights_object</oval:object> <oval:state>sharedresourceeffectiverights_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">sharedresourceeffectiverights_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_srertst"> <sch:rule context="win-def:sharedresourceeffectiverights_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:sharedresourceeffectiverights_object/@id"><sch:value-of select="../@id"/> - the object child element of a sharedresourceeffectiverights_test must reference a sharedresourceeffectiverights_object</sch:assert> </sch:rule> <sch:rule context="win-def:sharedresourceeffectiverights_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:sharedresourceeffectiverights_state/@id"><sch:value-of select="../@id"/> - the state child element of a sharedresourceeffectiverights_test must reference a sharedresourceeffectiverights_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="sharedresourceeffectiverights_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The sharedresourceeffectiverights_object element is used by a shared resource effective rights test to define the object, in this case a shared resource effective rights object, to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>A shared resource effective rights object consists of a netname entity that identifies a specific shared resource and a trustee_sid entity that identifies a specific account (SID) to check the effective rights of.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_sharedresourceeffectiverights_object_verify_filter_state"> <sch:rule context="win-def:sharedresourceeffectiverights_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:sharedresourceeffectiverights_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='sharedresourceeffectiverights_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:SharedResourceEffectiveRightsBehaviors" minOccurs="0"/> <xsd:element name="netname" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The netname element is the unique name that is associated with a specific shared resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_sid entity identifies a unique SID associated with a user, group, system, or program (such as a Windows service). If an operation other than equals is used to identify matching trustees (i.e. not equal, or a pattern match) then the resulting matches shall be limited to only the trustees referenced in the file's Security Descriptor. The scope is limited here to avoid unnecessarily resource intensive searches for trustees. Note that the larger scope of all known trustees may be obtained through the use of variables.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="sharedresourceeffectiverights_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The sharedresourceeffectiverights_state element defines the different rights that can be associated with a given sharedresourceeffectiverights_object. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="netname" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the name associated with a particular shared resource.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The trustee_sid element is the unique SID that associated a user, group, system, or program (such as a Windows service).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_delete" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to delete the object.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_read_control" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to read the information in the object's Security Descriptor, not including the information in the SACL.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_dac" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to modify the DACL in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_write_owner" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to change the owner in the object's Security Descriptor.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="standard_synchronize" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The right to use the object for synchronization. This enables a thread to wait until the object is in the signaled state. Some object types do not support this access right.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="access_system_security" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Indicates access to a system access control list (SACL).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_read" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_write" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Write access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_execute" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Execute access.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="generic_all" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Read, write, and execute access.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="SharedResourceEffectiveRightsBehaviors"> <xsd:annotation> <xsd:documentation>The SharedResourceEffectiveRightsBehaviors complex type defines a behavior that allows for a more detailed definition of the sharedresourceeffectiverights_object being specified. Note that using this behavior may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> </xsd:annotation> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group SID should be included in the object when the object is defined by a group SID. For example, the intent of an object defined by a group SID might be to retrieve all the user SIDs that are a member of the group, but not the group SID itself.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.10.1</oval:version> <oval:reason>The 'include_group' behavior has been deprecated in favor of using variables to reference more efficient objects for expanding groups.</oval:reason> <oval:comment>Consider using a sid_sid_object or similar to include the members of a group.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_sre_include_group_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:objects/win-def:sharedresourceeffectiverights_object/win-def:behaviors"> <sch:report test="@include_group">DEPRECATED BEHAVIOR IN: win-def:sharedresourceeffectiverights_object</sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:attribute> </xsd:complexType> <!-- =============================================================================== --> <!-- ================================= SID TEST ================================= --> <!-- =============================================================================== --> <xsd:element name="sid_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The SID test is used to check properties associated with the specified SID. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a sid_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>sid_test</oval:test> <oval:object>sid_object</oval:object> <oval:state>sid_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">sid_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_sidtst"> <sch:rule context="win-def:sid_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:sid_object/@id"><sch:value-of select="../@id"/> - the object child element of a sid_test must reference a sid_object</sch:assert> </sch:rule> <sch:rule context="win-def:sid_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:sid_state/@id"><sch:value-of select="../@id"/> - the state child element of a sid_test must reference a sid_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="sid_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The sid_object element is used by a sid_test to define the object set, in this case a set of SIDs (identified by name), to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_sid_object_verify_filter_state"> <sch:rule context="win-def:sid_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:sid_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='sid_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:SidBehaviors" minOccurs="0"/> <xsd:element name="trustee_name" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_name element is the unique name that associated a particular SID. A SID can be associated with a user, group, or program (such as a Windows service). In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="sid_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The sid_state element defines the different metadata associate with a Windows trustee (identified by name). Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="trustee_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the trustee name associated with a particular SID. In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The security identifier (SID) of the specified trustee name.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_domain" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The domain of the specified trustee name.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="SidBehaviors"> <xsd:annotation> <xsd:documentation>The SidBehaviors complex type defines a number of behaviors that allow a more detailed definition of the sid_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> </xsd:annotation> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group SID should be included in the object when the object is defined by a group SID. For example, the intent of an object defined by a group SID might be to retrieve all the user SIDs that are a member of the group, but not the group SID itself.</xsd:documentation> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> </xsd:annotation> </xsd:attribute> </xsd:complexType> <!-- =============================================================================== --> <!-- =============================== SID SID TEST =============================== --> <!-- =============================================================================== --> <xsd:element name="sid_sid_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The sid_sid_test is used to check properties associated with the specified SID. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a sid_sid_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:documentation>Note that this sid_sid test was added in version 5.4 as a temporary fix. There is a need within the community to identify things like users and groups by both the name and the SID. For version 6 of OVAL, work is underway for a better solution to the problem, but for now, a second test was added to satisfy the need.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>sid_sid_test</oval:test> <oval:object>sid_sid_object</oval:object> <oval:state>sid_sid_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">sid_sid_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_sidsidtst"> <sch:rule context="win-def:sid_sid_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:sid_sid_object/@id"><sch:value-of select="../@id"/> - the object child element of a sid_sid_test must reference a sid_sid_object</sch:assert> </sch:rule> <sch:rule context="win-def:sid_sid_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:sid_sid_state/@id"><sch:value-of select="../@id"/> - the state child element of a sid_sid_test must reference a sid_sid_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="sid_sid_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The sid_sid_object element is used by a sid_sid_test to define the object set, in this case a set of SIDs, to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_sid_sid_object_verify_filter_state"> <sch:rule context="win-def:sid_sid_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:sid_sid_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='sid_sid_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:SidSidBehaviors" minOccurs="0"/> <xsd:element name="trustee_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The trustee_sid entity identifies a unique SID associated with a user, group, system, or program (such as a Windows service).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="sid_sid_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The sid_state element defines the different metadata associate with a Windows trustee (identified by SID). Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The security identifier (SID) of the specified trustee name.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element specifies the trustee name associated with a particular SID. In Windows, trustee names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, trustee names should be identified in the form: "domain\trustee name". For local trustee names use: "computer name\trustee name". For built-in accounts on the system, use the trustee name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_domain" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The domain of the specified trustee name.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="SidSidBehaviors"> <xsd:annotation> <xsd:documentation>The SidSidBehaviors complex type defines a number of behaviors that allow a more detailed definition of the sid_sid_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> </xsd:annotation> <xsd:attribute name="include_group" type="xsd:boolean" use="optional" default="true"> <xsd:annotation> <xsd:documentation>'include_group' defines whether the group SID should be included in the object when the object is defined by a group SID. For example, the intent of an object defined by a group SID might be to retrieve all the user SIDs that are a member of the group, but not the group SID itself.</xsd:documentation> </xsd:annotation> </xsd:attribute> <xsd:attribute name="resolve_group" type="xsd:boolean" use="optional" default="false"> <xsd:annotation> <xsd:documentation>The 'resolve_group' behavior defines whether an object set defined by a group SID should be resolved to return a set that contains all the user SIDs that are a member of that group. Note that all child groups should also be resolved any valid domain users that are members of the group should also be included. The intent of this behavior is to end up with a list of all individual users from that system that make up the group once everything has been resolved.</xsd:documentation> </xsd:annotation> </xsd:attribute> </xsd:complexType> <!-- =============================================================================== --> <!-- =============================== SYSTEM METRIC TEST ========================== --> <!-- =============================================================================== --> <xsd:element name="systemmetric_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The system metric test is used to check the value of a particular Windows system metric. Access to this information is exposed by the GetSystemMetrics function in User32.dll.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="systemmetric_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The system metric object element is used by a system metric test to define the object to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="index" type="win-def:EntityObjectSystemMetricIndexType"> <xsd:annotation> <xsd:documentation>The index entity provides the system metric index value that is desired.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="systemmetric_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The system metric state element defines the different information that can be found in a Windows system metric value. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="index" type="win-def:EntityStateSystemMetricIndexType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The index entity corresponds to the systemmetric_object index entity.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="value" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The optional value entity provides the value of the system metric that is expected.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ========================= USER ACCESS CONTROL TEST ========================== --> <!-- =============================================================================== --> <xsd:element name="uac_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The user access control test is used to check setting related to User Access Control within Windows. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a uaac_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>uac_test</oval:test> <oval:object>uac_object</oval:object> <oval:state>uac_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">uac_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_uactst"> <sch:rule context="win-def:uac_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:uac_object/@id"><sch:value-of select="../@id"/> - the object child element of a uac_test must reference a uac_object</sch:assert> </sch:rule> <sch:rule context="win-def:uac_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:uac_state/@id"><sch:value-of select="../@id"/> - the state child element of a uac_test must reference a uac_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="uac_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The uac_object element is used by a user access control test to define those objects to evaluate based on a specified state. There is actually only one object relating to user access control and this is the system as a whole. Therefore, there are no child entities defined. Any OVAL Test written to check user access control settings will reference the same uac_object which is basically an empty object element.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"/> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="uac_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The uac_state element specifies the different settings that are available under User Access Control. A user access control test will reference a specific instance of this state that defines the exact settings that need to be evaluated. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="admin_approval_mode" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Admin Approval Mode for the Built-in Administrator account.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="elevation_prompt_admin" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Behavior of the elevation prompt for administrators in Admin Approval Mode.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="elevation_prompt_standard" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Behavior of the elevation prompt for standard users.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="detect_installations" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Detect application installations and prompt for elevation.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="elevate_signed_executables" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Only elevate executables that are signed and validated.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="elevate_uiaccess" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Only elevate UIAccess applications that are installed in secure locations.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="run_admins_aam" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Run all administrators in Admin Approval Mode.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="secure_desktop" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Switch to the secure desktop when prompting for elevation.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="virtualize_write_failures" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Virtualize file and registry write failures to per-user locations.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ================================= USER TEST ================================= --> <!-- =============================================================================== --> <xsd:element name="user_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The user_test is used to check information about Windows users. When the user_test collects the users on the system, it should only include the local and built-in user accounts and not domain user accounts. However, it is important to note that domain user accounts can still be looked up. Also, note that the collection of groups, for which a user is a member, is not recursive. The only groups that will be collected are those for which the user is a direct member. For example, if a user is a member of group A, and group A is a member of group B, the only group that will be collected is group A. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a user_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>user_test</oval:test> <oval:object>user_object</oval:object> <oval:state>user_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">user_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>Replaced by the user_sid55_test. This test uses trustee names for identifying accounts on the system. Trustee names are not unique and the user_sid55_test, which uses trustee SIDs which are unique, should be used instead. See the user_sid55_test.</oval:reason> <oval:comment>This test has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_usertst_dep"> <sch:rule context="win-def:user_test"> <sch:report test="true()">DEPRECATED TEST: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_usertst"> <sch:rule context="win-def:user_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:user_object/@id"><sch:value-of select="../@id"/> - the object child element of a user_test must reference a user_object</sch:assert> </sch:rule> <sch:rule context="win-def:user_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:user_state/@id"><sch:value-of select="../@id"/> - the state child element of a user_test must reference a user_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="user_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation/> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>Replaced by the user_sid55_object. This object uses trustee names for identifying accounts on the system. Trustee names are not unique and the user_sid55_object, which uses trustee SIDs which are unique, should be used instead. See the user_sid55_object.</oval:reason> <oval:comment>This object has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_userobj_dep"> <sch:rule context="win-def:user_object"> <sch:report test="true()">DEPRECATED OBJECT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_user_object_verify_filter_state"> <sch:rule context="win-def:user_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:user_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='user_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="user" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The user entity holds a string that represents the name of a particular user. In Windows, user names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, users should be identified in the form: "domain\user name". For local users use: "computer name\user name". For built-in accounts on the system, use the user name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="user_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The user_state element enumerates the different groups (identified by name) that a Windows user might belong to. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.11</oval:version> <oval:reason>Replaced by the user_sid55_state. This state uses trustee names for identifying accounts on the system. Trustee names are not unique and the user_sid55_state, which uses trustee SIDs which are unique, should be used instead. See the user_sid55_state.</oval:reason> <oval:comment>This state has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_userste_dep"> <sch:rule context="win-def:user_state"> <sch:report test="true()">DEPRECATED STATE: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="user" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The user entity holds a string that represents the name of a particular user. In Windows, user names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, users should be identified in the form: "domain\user name". For local users use: "computer name\user name". For built-in accounts on the system, use the user name without a domain.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="enabled" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element holds a boolean value that specifies whether the particular user account is enabled or not.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="group" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>A string that represents the name of a particular group. In Windows, group names are case-insensitive. As a result, it is recommended that the case-insensitive operations are used for this entity. In a domain environment, groups should be identified in the form: "domain\group name". For local groups use: "computer name\group name". For built-in accounts on the system, use the group name without a domain.</xsd:documentation> <xsd:documentation>The group element can be included multiple times in a system characteristic item in order to record that a user can be a member of a number of different groups. Note that the entity_check attribute associated with EntityStateStringType guides the evaluation of entities like group that refer to items that can occur an unbounded number of times.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="last_logon" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The date and time when the last logon occurred. This value is stored as the number of seconds that have elapsed since 00:00:00, January 1, 1970, GMT.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ============================ USER SID TEST (55) ============================= --> <!-- =============================================================================== --> <xsd:element name="user_sid55_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The user_sid55_test is used to check information about Windows users. When the user_sid55_test collects the user SIDs on the system, it should only include the local and built-in user SIDs and not domain user SIDs. However, it is important to note that domain user SIDs can still be looked up. Also, note that the collection of groups, for which a user is a member, is not recursive. The only groups that will be collected are those for which the user is a direct member. For example, if a user is a member of group A, and group A is a member of group B, the only group that will be collected is group A. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a user_sid55_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>user_sid55_test</oval:test> <oval:object>user_sid55_object</oval:object> <oval:state>user_sid55_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">user_sid_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_usersid55tst"> <sch:rule context="win-def:user_sid55_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:user_sid55_object/@id"><sch:value-of select="../@id"/> - the object child element of a user_sid55_test must reference a user_sid55_object</sch:assert> </sch:rule> <sch:rule context="win-def:user_sid55_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:user_sid55_state/@id"><sch:value-of select="../@id"/> - the state child element of a user_sid55_test must reference a user_sid55_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="user_sid55_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The user_sid55_object represents a set of users on a Windows system. This set (which might contain only one user) is identified by a SID.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_user_sid55_object_verify_filter_state"> <sch:rule context="win-def:user_sid55_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:user_sid55_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='user_sid55_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="user_sid" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The user_sid entity holds a string that represents the SID of a particular user.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="user_sid55_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The user_sid55_state element enumerates the different groups (identified by SID) that a Windows user might belong to. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="user_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The user_sid entity holds a string that represents the SID of a particular user.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="enabled" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element holds a boolean value that specifies whether the particular user account is enabled or not.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="group_sid" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>A string the represents the SID of a particular group. The group_sid element can be included multiple times in a system characteristic item in order to record that a user can be a member of a number of different groups. Note that the entity_check attribute associated with EntityStateStringType guides the evaluation of entities like group that refer to items that can occur an unbounded number of times.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="last_logon" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The date and time when the last logon occurred. This value is stored as the number of seconds that have elapsed since 00:00:00, January 1, 1970, GMT.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ======================== USER SID TEST (deprecated) ========================= --> <!-- =============================================================================== --> <xsd:element name="user_sid_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The user_sid_test is used to check information about Windows users. When the user_sid_test collects the user SIDs on the system, it should only include the local and built-in user SIDs and not domain user SIDs. However, it is important to note that domain user SIDs can still be looked up. Also, note that the collection of groups, for which a user is a member, is not recursive. The only groups that will be collected are those for which the user is a direct member. For example, if a user is a member of group A, and group A is a member of group B, the only group that will be collected is group A. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a user_sid_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>user_sid_test</oval:test> <oval:object>user_sid_object</oval:object> <oval:state>user_sid_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">user_sid_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.5</oval:version> <oval:reason>Replaced by the user_sid55_test. This test uses user and group elements that are incorrectly named. A new test was created to change the element names to their correct values which are user_sid and group_sid. See the user_sid55_test.</oval:reason> <oval:comment>This test has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_usersidtst_dep"> <sch:rule context="win-def:user_sid_test"> <sch:report test="true()">DEPRECATED TEST: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_usersidtst"> <sch:rule context="win-def:user_sid_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:user_sid_object/@id"><sch:value-of select="../@id"/> - the object child element of a user_sid_test must reference a user_sid_object</sch:assert> </sch:rule> <sch:rule context="win-def:user_sid_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:user_sid_state/@id"><sch:value-of select="../@id"/> - the state child element of a user_sid_test must reference a user_sid_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="user_sid_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The user_sid_object represents a set of users on a Windows system. This set (which might contain only one user) is identified by a SID.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.5</oval:version> <oval:reason>Replaced by the user_sid55_object. This object uses a user element that is incorrectly named. A new object was created to change the element name to its correct value which is user_sid. See the user_sid55_object.</oval:reason> <oval:comment>This object has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_usersidobj_dep"> <sch:rule context="win-def:user_sid_object"> <sch:report test="true()">DEPRECATED OBJECT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:element name="user" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The user_sid entity holds a string that represents the SID of a particular user.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="user_sid_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The user_sid_state element enumerates the different groups (identified by SID) that a Windows user might belong to. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.5</oval:version> <oval:reason>Replaced by the user_sid55_state. This state uses user and group elements that are incorrectly named. A new state was created to change the element names to their correct values which are user_sid and group_sid. See the user_sid55_state.</oval:reason> <oval:comment>This state has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_usersidste_dep"> <sch:rule context="win-def:user_sid_state"> <sch:report test="true()">DEPRECATED STATE: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="user" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The user_sid entity holds a string that represents the SID of a particular user.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="enabled" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>This element holds a boolean value that specifies whether the particular user account is enabled or not.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="group" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>A string the represents the SID of a particular group. The group_sid element can be included multiple times in a system characteristic item in order to record that a user can be a member of a number of different groups. Note that the entity_check attribute associated with EntityStateStringType guides the evaluation of entities like group that refer to items that can occur an unbounded number of times.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ============================= USER RIGHT TEST =============================== --> <!-- =============================================================================== --> <xsd:element name="userright_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The userright_test is used to enumerate all of the SIDs that have been granted a specific user right/privilege.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>userright_test</oval:test> <oval:object>userright_object</oval:object> <oval:state>userright_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">userright_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_userrighttst"> <sch:rule context="win-def:userright_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:userright_object/@id"><sch:value-of select="../@id"/> - the object child element of a userright_test must reference a userright_object</sch:assert> </sch:rule> <sch:rule context="win-def:userright_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:userright_state/@id"><sch:value-of select="../@id"/> - the state child element of a userright_test must reference a userright_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="userright_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The userright_object is used to collect the SIDs that have been granted a specific user right/privilege.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_userright_object_verify_filter_state"> <sch:rule context="win-def:userright_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:userright_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='userright_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="userright" type="win-def:EntityObjectUserRightType" minOccurs="1" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The userright entity holds a string that represents the name of a particular user right/privilege.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="userright_state" substitutionGroup="oval-def:state"> <xsd:complexType> <xsd:annotation> <xsd:documentation>The userright_state is used to determine if a SID has been granted a user right/privilege.</xsd:documentation> </xsd:annotation> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="userright" type="win-def:EntityStateUserRightType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The userright entity holds a string that represents the name of a particular user right/privilege.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="trustee_sid" type="oval-def:EntityStateStringType" minOccurs="0" maxOccurs="1"> <xsd:annotation> <xsd:documentation>The trustee_sid element identifies the SID that has been granted the specified user right/privilege. The trustee_sid element can be included multiple times in a system characteristic item in order to record that a user right/privilege has been granted to a number of SIDs. Note that the entity_check attribute associated with EntityStateStringType guides the evaluation of entities like trustee_sid that refer to items that can occur an unbounded number of times.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ================================ VOLUME TEST ================================ --> <!-- =============================================================================== --> <xsd:element name="volume_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The volume_test is used to check information about different storage volumes found on a Windows system. This includes the various system flags returned by GetVolumeInformation(). It is important to note that these system flags are specific to certain versions of Windows. As a result, the documentation for that version of Windows should be consulted for more information. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a volume_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>volume_test</oval:test> <oval:object>volume_object</oval:object> <oval:state>volume_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">volume_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_volumetst"> <sch:rule context="win-def:volume_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:volume_object/@id"><sch:value-of select="../@id"/> - the object child element of a volume_test must reference a volume_object</sch:assert> </sch:rule> <sch:rule context="win-def:volume_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:volume_state/@id"><sch:value-of select="../@id"/> - the state child element of a volume_test must reference a volume_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="volume_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The volume_object element is used by a volume test to define the specific volume(s) to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:documentation>A volume object defines the rootpath of the volume(s).</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_volume_object_verify_filter_state"> <sch:rule context="win-def:volume_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:volume_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='volume_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="rootpath" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>A string that contains the root directory of the volume to be described. A trailing backslash is required. For example, you would specify \\MyServer\MyShare as "\\MyServer\MyShare\", or the C drive as "C:\".</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="volume_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The volume_state element defines the different metadata associate with a storage volume in Windows. This includes the rootpath, the file system type, name, and serial number, as well as any associated flags. Please refer to the individual elements in the schema for more details about what each represents. The GetVolumeInformation function as defined by Microsoft is also a good place to look for information.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="rootpath" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>A string that contains the root directory of the volume to be described. A trailing backslash is required. For example, you would specify \\MyServer\MyShare as "\\MyServer\MyShare\", or the C drive as "C:\".</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_system" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The type of filesystem. For example FAT or NTFS.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="name" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The name of the volume.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="drive_type" type="win-def:EntityStateDriveTypeType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The drive type of the volume.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="volume_max_component_length" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The volume_max_component_length element specifies the maximum length, in TCHARs, of a file name component that a specified file system supports. A file name component is the portion of a file name between backslashes. The value that is stored in the variable that *lpMaximumComponentLength points to is used to indicate that a specified file system supports long names. For example, for a FAT file system that supports long names, the function stores the value 255, rather than the previous 8.3 indicator. Long names can also be supported on systems that use the NTFS file system.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="serial_number" type="oval-def:EntityStateIntType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The volume serial number.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_case_sensitive_search" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports case-sensitive file names.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_case_preserved_names" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system preserves the case of file names when it places a name on disk.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_unicode_on_disk" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports Unicode in file names as they appear on disk.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_persistent_acls" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system preserves and enforces ACLs. For example, NTFS preserves and enforces ACLs, and FAT does not.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_file_compression" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports file-based compression.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_volume_quotas" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports disk quotas.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_supports_sparse_files" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports sparse files.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_supports_reparse_points" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports reparse points.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_supports_remote_storage" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports remote storage.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_volume_is_compressed" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The specified volume is a compressed volume; for example, a DoubleSpace volume.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_supports_object_ids" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports object identifiers.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_supports_encryption" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports the Encrypted File System (EFS).</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_named_streams" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports named streams.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_read_only_volume" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The specified volume is read-only.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_sequential_write_once" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports one time writes in sequential order.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_supports_transactions" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports transaction processing.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_supports_hard_links" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports direct links to other devices and partitions.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_supports_extended_attributes" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports extended attributes.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_supports_open_by_file_id" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports fileID.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="file_supports_usn_journal" type="oval-def:EntityStateBoolType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The file system supports update sequence number journals.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ================================= WMI TEST ================================== --> <!-- =============================================================================== --> <xsd:element name="wmi_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The wmi test is used to check information accessed by WMI. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a wmi_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>wmi_test</oval:test> <oval:object>wmi_object</oval:object> <oval:state>wmi_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">wmi_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.7</oval:version> <oval:reason>Replaced by the wmi57_test. This test only allows for single fields to be selected from WMI. A new test was created to allow more than one field to be selected in one statement. See the wmi57_test.</oval:reason> <oval:comment>This test has been deprecated and may be removed in a future version of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_wmitst_dep"> <sch:rule context="win-def:wmi_test"> <sch:report test="true()">DEPRECATED TEST: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_wmitst"> <sch:rule context="win-def:wmi_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:wmi_object/@id"><sch:value-of select="../@id"/> - the object child element of a wmi_test must reference a wmi_object</sch:assert> </sch:rule> <sch:rule context="win-def:wmi_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:wmi_state/@id"><sch:value-of select="../@id"/> - the state child element of a wmi_test must reference a wmi_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="wmi_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation/> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.7</oval:version> <oval:reason>Replaced by the wmi57_object. This object allows for single fields to be selected from WMI. A new object was created to allow more than one field to be selected in one statement. See the wmi57_object.</oval:reason> <oval:comment>This object has been deprecated and may be removed in a future version of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_wmiobj_dep"> <sch:rule context="win-def:wmi_object"> <sch:report test="true()">DEPRECATED OBJECT: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="namespace" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>Specifies which WMI namespace to look under. Each WMI provider normally registers its own WMI namespace and then all its classes within that namespace. For example, all Win32 WMI classes can be found in the namespace "root\cimv2", all IIS WMI classes can be found at "root\microsoftiisv2", and all LDAP WMI classes can be found at "root\directory\ldap".</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_wmiobjnamespace"> <sch:rule context="win-def:wmi_object/win-def:namespace"> <sch:assert test="not(@operation) or @operation='equals'"><sch:value-of select="../@id"/> - operation attribute for the namespace entity of a wmi_object should be 'equals', note that this overrules the general operation attribute validation (i.e. follow this one)</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="wql" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>A WQL query used to identify the object(s) to test against. Any valid WQL query is usable with one exception, at most one field is allowed in the SELECT portion of the query. For example SELECT name FROM ... is valid, as is SELECT 'true' FROM ..., but SELECT name, number FROM ... is not valid. This is because the result element in the data section is only designed to work against a single field.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_wmiobjwql"> <sch:rule context="win-def:wmi_object/win-def:wql"> <sch:assert test="not(@operation) or @operation='equals'"><sch:value-of select="../@id"/> - operation attribute for the wql entity of a wmi_object should be 'equals', note that this overrules the general operation attribute validation (i.e. follow this one)</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="wmi_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation/> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.7</oval:version> <oval:reason>Replaced by the wmi57_state. This object allows for single fields to be selected from WMI. A new state was created to allow more than one field to be selected in one statement. See the wmi57_state.</oval:reason> <oval:comment>This state has been deprecated and may be removed in a future version of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_wmiste_dep"> <sch:rule context="win-def:wmi_state"> <sch:report test="true()">DEPRECATED STATE: <sch:value-of select="name()"/> ID: <sch:value-of select="@id"/></sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="namespace" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies which WMI namespace to look under. Each WMI provider normally registers its own WMI namespace and then all its classes within that namespace. For example, all Win32 WMI classes can be found in the namespace "root\cimv2", all IIS WMI classes can be found at "root\microsoftiisv2", and all LDAP WMI classes can be found at "root\directory\ldap".</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="wql" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>A WQL query used to identify the object(s) to test against. Any valid WQL query is usable with one exception, at most one field is allowed in the SELECT portion of the query. For example SELECT name FROM ... is valid, as is SELECT 'true' FROM ..., but SELECT name, number FROM ... is not valid. This is because the result element in the data section is only designed to work against a single field.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="result" type="oval-def:EntityStateAnySimpleType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The result element specifies how to test objects in the result set of the specified WQL statement. Only one comparable field is allowed. So if the WQL statement look like 'SELECT name FROM ...', then a result element with a value of 'Fred' would test that value against the names returned by the WQL statement.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ================================= WMI TEST (57) ============================= --> <!-- =============================================================================== --> <xsd:element name="wmi57_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The wmi57 test is used to check information accessed by WMI. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a wmi57_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>wmi57_test</oval:test> <oval:object>wmi57_object</oval:object> <oval:state>wmi57_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">wmi57_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_wmi57tst"> <sch:rule context="win-def:wmi57_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:wmi57_object/@id"><sch:value-of select="../@id"/> - the object child element of a wmi57_test must reference a wmi57_object</sch:assert> </sch:rule> <sch:rule context="win-def:wmi57_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:wmi57_state/@id"><sch:value-of select="../@id"/> - the state child element of a wmi57_test must reference a wmi57_state</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="wmi57_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation/> <xsd:appinfo> <sch:pattern id="win-def_wmi57_object_verify_filter_state"> <sch:rule context="win-def:wmi57_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:wmi57_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='wmi57_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="namespace" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>Specifies which WMI namespace to look under. Each WMI provider normally registers its own WMI namespace and then all its classes within that namespace. For example, all Win32 WMI classes can be found in the namespace "root\cimv2", all IIS WMI classes can be found at "root\microsoftiisv2", and all LDAP WMI classes can be found at "root\directory\ldap".</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_wmi57objnamespace"> <sch:rule context="win-def:wmi57_object/win-def:namespace"> <sch:assert test="not(@operation) or @operation='equals'"><sch:value-of select="../@id"/> - operation attribute for the namespace entity of a wmi57_object should be 'equals', note that this overrules the general operation attribute validation (i.e. follow this one)</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element name="wql" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>A WQL query used to identify the object(s) to test against. Any valid WQL query is usable with one exception, all fields must be named in the SELECT portion of the query. For example SELECT name, age FROM ... is valid. However, SELECT * FROM ... is not valid. This is because the record element in the state and item require a unique field name value to ensure that any query results can be evaluated consistently.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_wmi57objwql"> <sch:rule context="win-def:wmi57_object/win-def:wql"> <sch:assert test="not(@operation) or @operation='equals'"><sch:value-of select="../@id"/> - operation attribute for the wql entity of a wmi57_object should be 'equals', note that this overrules the general operation attribute validation (i.e. follow this one)</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="wmi57_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation/> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="namespace" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>Specifies which WMI namespace to look under. Each WMI provider normally registers its own WMI namespace and then all its classes within that namespace. For example, all Win32 WMI classes can be found in the namespace "root\cimv2", all IIS WMI classes can be found at "root\microsoftiisv2", and all LDAP WMI classes can be found at "root\directory\ldap".</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="wql" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>A WQL query used to identify the object(s) to test against. Any valid WQL query is usable with one exception, all fields must be named in the SELECT portion of the query. For example SELECT name, age FROM ... is valid. However, SELECT * FROM ... is not valid. This is because the record element in the state and item require a unique field name value to ensure that any query results can be evaluated consistantly.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="result" type="oval-def:EntityStateRecordType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The result element specifies how to test items in the result set of the specified WQL statement.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_wmi57steresult"> <sch:rule context="win-def:wmi57_state/win-def:result"> <sch:assert test="@datatype='record'"><sch:value-of select="../@id"/> - datatype attribute for the result entity of a wmi57_object must be 'record'</sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:unique name="UniqueWmiResultFieldName"> <xsd:selector xpath="./oval-def:field"/> <xsd:field xpath="@name"/> </xsd:unique> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <!-- =============================================================================== --> <!-- ========================= WUA UPDATE SEARCHER TEST ========================== --> <!-- =============================================================================== --> <xsd:element name="wuaupdatesearcher_test" substitutionGroup="oval-def:test"> <xsd:annotation> <xsd:documentation>The wuaupdatesearcher_test is used to evaluate patch level in a Windows environment utilizing the WUA (Windows Update Agent) interface. It is based on the Search method of the IUpdateSearcher interface found in the WUA API. It extends the standard TestType as defined in the oval-definitions-schema and one should refer to the TestType description for more information. The required object element references a wuaupdatesearcher_object and the optional state element specifies the metadata to check.</xsd:documentation> <xsd:documentation>Note that WUA can work off of many different sources including WSUS, update.microsoft.com, and a local cab file. The content source is specific to a given system evaluating a wuaupdatesearcher_test and thus is not defined by this test. The tool being used for evaluation should determine what content source is best for the system being assessed and then evaluate this test based on that selection.</xsd:documentation> <xsd:appinfo> <oval:element_mapping> <oval:test>wuaupdatesearcher_test</oval:test> <oval:object>wuaupdatesearcher_object</oval:object> <oval:state>wuaupdatesearcher_state</oval:state> <oval:item target_namespace="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows">wuaupdatesearcher_item</oval:item> </oval:element_mapping> </xsd:appinfo> <xsd:appinfo> <sch:pattern id="win-def_wuaupdatesearchertst"> <sch:rule context="win-def:wuaupdatesearcher_test/win-def:object"> <sch:assert test="@object_ref=ancestor::oval-def:oval_definitions/oval-def:objects/win-def:wuaupdatesearcher_object/@id"> <sch:value-of select="../@id"/> - the object child element of a wuaupdatesearcher_test must reference a wuaupdatesearcher_object </sch:assert> </sch:rule> <sch:rule context="win-def:wuaupdatesearcher_test/win-def:state"> <sch:assert test="@state_ref=ancestor::oval-def:oval_definitions/oval-def:states/win-def:wuaupdatesearcher_state/@id"> <sch:value-of select="../@id"/> - the state child element of a wuaupdatesearcher_test must reference a wuaupdatesearcher_state </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:TestType"> <xsd:sequence> <xsd:element name="object" type="oval-def:ObjectRefType"/> <xsd:element name="state" type="oval-def:StateRefType" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="wuaupdatesearcher_object" substitutionGroup="oval-def:object"> <xsd:annotation> <xsd:documentation>The wuaupdatesearcher_object element is used by a wuaupdatesearcher_test to define the specific search criteria to be evaluated. Each object extends the standard ObjectType as defined in the oval-definitions-schema and one should refer to the ObjectType description for more information. The common set element allows complex objects to be created using filters and set logic. Again, please refer to the description of the set element in the oval-definitions-schema.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_wuaupdatesearcher_object_verify_filter_state"> <sch:rule context="win-def:wuaupdatesearcher_object//oval-def:filter"> <sch:let name="parent_object" value="ancestor::win-def:wuaupdatesearcher_object"/> <sch:let name="parent_object_id" value="$parent_object/@id"/> <sch:let name="state_ref" value="."/> <sch:let name="reffed_state" value="ancestor::oval-def:oval_definitions/oval-def:states/*[@id=$state_ref]"/> <sch:let name="state_name" value="local-name($reffed_state)"/> <sch:let name="state_namespace" value="namespace-uri($reffed_state)"/> <sch:assert test="(($state_namespace='http://oval.mitre.org/XMLSchema/oval-definitions-5#windows') and ($state_name='wuaupdatesearcher_state'))">State referenced in filter for <sch:value-of select="name($parent_object)"/> '<sch:value-of select="$parent_object_id"/>' is of the wrong type. </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:ObjectType"> <xsd:sequence> <xsd:choice> <xsd:element ref="oval-def:set"/> <xsd:sequence> <xsd:element name="behaviors" type="win-def:WuaUpdateSearcherBehaviors" minOccurs="0"/> <xsd:element name="search_criteria" type="oval-def:EntityObjectStringType"> <xsd:annotation> <xsd:documentation>The search_criteria entity specifies a search criteria to use when generating a search result. The string used for the search criteria entity must match the custom search language for Search method of the IUpdateSearcher interface. The string consists of criteria that are evaluated to determine which updates to return. The Search method performs a synchronous search for updates by using the current configured search options. For more information about possible search criteria, please see the Search method of the IUpdateSearcher interface.</xsd:documentation> <xsd:appinfo> <sch:pattern id="win-def_wuaupdatesearcherobjsearchcriteria"> <sch:rule context="win-def:wuaupdatesearcher_object/win-def:search_criteria"> <sch:assert test="not(@operation) or @operation='equals'"> <sch:value-of select="../@id"/> - operation attribute for the search_criteria entity of a wuaupdatesearcher_object must be 'equals' </sch:assert> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:element> <xsd:element ref="oval-def:filter" minOccurs="0" maxOccurs="unbounded"/> </xsd:sequence> </xsd:choice> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:element name="wuaupdatesearcher_state" substitutionGroup="oval-def:state"> <xsd:annotation> <xsd:documentation>The wuaupdatesearcher_state element defines entities that can be tested related to a uaupdatesearcher_object. This includes the search criteria and updated id. Please refer to the individual elements in the schema for more details about what each represents.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:complexContent> <xsd:extension base="oval-def:StateType"> <xsd:sequence> <xsd:element name="search_criteria" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The search_criteria entity specifies a string to examine the search criteria that was used to generate the object set. Note that since this entity is part of the state, it is not used to determine the object set, but rather is used to test the search criteria that was actually used.</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="update_id" type="oval-def:EntityStateStringType" minOccurs="0"> <xsd:annotation> <xsd:documentation>The update_id enity specifies a string that represents a revision-independent identifier of an update. This information is part of the IUpdateIdentity interface that is part of the result of the IUpdateSearcher interface's Search method.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> </xsd:extension> </xsd:complexContent> </xsd:complexType> </xsd:element> <xsd:complexType name="WuaUpdateSearcherBehaviors"> <xsd:annotation> <xsd:documentation>The WuaUpdateSearcherBehaviors complex type defines behaviors that allow a more detailed definition of the wuaupdatesearcher_object being specified. Note that using these behaviors may result in some unique results. For example, a double negative type condition might be created where an object entity says include everything except a specific item, but a behavior is used that might then add that item back in.</xsd:documentation> </xsd:annotation> <xsd:attribute name="include_superseded_updates" use="optional" type="xsd:boolean" default="true"> <xsd:annotation> <xsd:documentation>'include_superseded_updates' is a boolean flag that when set to true indicates that the search results should include updates that are superseded by other updates in the search results. When set to 'false' superseded updates should be excluded from the set of matching update items. The default value is 'true'.</xsd:documentation> </xsd:annotation> </xsd:attribute> </xsd:complexType> <!-- =============================================================================== --> <!-- =============================================================================== --> <!-- =============================================================================== --> <xsd:complexType name="EntityStateAddrTypeType"> <xsd:annotation> <xsd:documentation>The EntityStateAddrTypeType complex type restricts a string value to a specific set of values that describe address types associated with an interface. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="MIB_IPADDR_DELETED"> <xsd:annotation> <xsd:documentation>The stated IP address is being deleted. The unsigned short value that this corresponds to is 0x0040</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="MIB_IPADDR_DISCONNECTED"> <xsd:annotation> <xsd:documentation>The stated IP address is on a disconnected interface. The unsigned short value that this corresponds to is 0x0008.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="MIB_IPADDR_DYNAMIC"> <xsd:annotation> <xsd:documentation>The stated IP address is a dynamic IP address. The unsigned short value that this corresponds to is 0x0004.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="MIB_IPADDR_PRIMARY"> <xsd:annotation> <xsd:documentation>The stated IP address is a primary IP address. The unsigned short value that this corresponds to is 0x0001.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="MIB_IPADDR_TRANSIENT"> <xsd:annotation> <xsd:documentation>The stated IP address is a transient IP address. The unsigned short value that this corresponds to is 0x0080</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateAdstypeType"> <xsd:annotation> <xsd:documentation>The EntityStateAdstypeType complex type restricts a string value to a specific set of values that specify the different types of information that an active directory attribute can represents. For more information look at the ADSTYPEENUM enumeration defined by Microsoft. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="ADSTYPE_INVALID"> <xsd:annotation> <xsd:documentation>The data type is invalid.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_DN_STRING"> <xsd:annotation> <xsd:documentation>The string is of Distinguished Name (path) of a directory service object.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_CASE_EXACT_STRING"> <xsd:annotation> <xsd:documentation>The string is of the case-sensitive type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_CASE_IGNORE_STRING"> <xsd:annotation> <xsd:documentation>The string is of the case-insensitive type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_PRINTABLE_STRING"> <xsd:annotation> <xsd:documentation>The string is displayable on the screen or in print.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_NUMERIC_STRING"> <xsd:annotation> <xsd:documentation>The string is of a numeric value to be interpreted as text.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_BOOLEAN"> <xsd:annotation> <xsd:documentation>The data is of a Boolean value.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_INTEGER"> <xsd:annotation> <xsd:documentation>The data is of an integer value.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_OCTET_STRING"> <xsd:annotation> <xsd:documentation>The string is of a byte array.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_UTC_TIME"> <xsd:annotation> <xsd:documentation>The data is of the universal time as expressed in Universal Time Coordinate (UTC).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_LARGE_INTEGER"> <xsd:annotation> <xsd:documentation>The data is of a long integer value.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_PROV_SPECIFIC"> <xsd:annotation> <xsd:documentation>The string is of a provider-specific string.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_OBJECT_CLASS"> <xsd:annotation> <xsd:documentation>Not used.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_CASEIGNORE_LIST"> <xsd:annotation> <xsd:documentation>The data is of a list of case insensitive strings.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_OCTET_LIST"> <xsd:annotation> <xsd:documentation>The data is of a list of octet strings.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_PATH"> <xsd:annotation> <xsd:documentation>The string is of a directory path.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_POSTALADDRESS"> <xsd:annotation> <xsd:documentation>The string is of the postal address type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_TIMESTAMP"> <xsd:annotation> <xsd:documentation>The data is of a time stamp in seconds.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_BACKLINK"> <xsd:annotation> <xsd:documentation>The string is of a back link.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_TYPEDNAME"> <xsd:annotation> <xsd:documentation>The string is of a typed name.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_HOLD"> <xsd:annotation> <xsd:documentation>The data is of the Hold data structure.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_NETADDRESS"> <xsd:annotation> <xsd:documentation>The string is of a net address.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_REPLICAPOINTER"> <xsd:annotation> <xsd:documentation>The data is of a replica pointer.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_FAXNUMBER"> <xsd:annotation> <xsd:documentation>The string is of a fax number.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_EMAIL"> <xsd:annotation> <xsd:documentation>The data is of an e-mail message.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_NT_SECURITY_DESCRIPTOR"> <xsd:annotation> <xsd:documentation>The data is of Windows NT/Windows 2000 Security Descriptor as represented by a byte array.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_UNKNOWN"> <xsd:annotation> <xsd:documentation>The data is of an undefined type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_DN_WITH_BINARY"> <xsd:annotation> <xsd:documentation>The data is of ADS_DN_WITH_BINARY used for mapping a distinguished name to a non varying GUID. </xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="ADSTYPE_DN_WITH_STRING"> <xsd:annotation> <xsd:documentation>The data is of ADS_DN_WITH_STRING used for mapping a distinguished name to a non-varying string value.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateAuditType"> <xsd:annotation> <xsd:documentation>The EntityStateAuditType complex type restricts a string value to a specific set of values: AUDIT_NONE, AUDIT_SUCCESS, AUDIT_FAILURE, and AUDIT_SUCCESS_FAILURE. These values describe which audit records should be generated. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="AUDIT_FAILURE"> <xsd:annotation> <xsd:documentation>The audit type AUDIT_FAILURE is used to perform audits on all unsuccessful occurrences of specified events when auditing is enabled.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="AUDIT_NONE"> <xsd:annotation> <xsd:documentation>The audit type AUDIT_NONE is used to cancel all auditing options for the specified events.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="AUDIT_SUCCESS"> <xsd:annotation> <xsd:documentation>The audit type AUDIT_SUCCESS is used to perform audits on all successful occurrences of the specified events when auditing is enabled.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="AUDIT_SUCCESS_FAILURE"> <xsd:annotation> <xsd:documentation>The audit type AUDIT_SUCCESS_FAILURE is used to perform audits on all successful and unsuccessful occurrences of the specified events when auditing is enabled.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateDriveTypeType"> <xsd:annotation> <xsd:documentation>The EntityStateDriveTypeType complex type defines the different values that are valid for the drive_type entity of a win-def:volume_state. Note that the Windows API returns a UINT value and OVAL uses the constant name that is normally defined for these return values. This is done to increase readability and maintainability of OVAL Definitions. The empty string is also allowed as a valid value to support an empty element that is found when a variable reference is used within the drive_type entity. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="DRIVE_UNKNOWN"> <xsd:annotation> <xsd:documentation>The DRIVE_UNKNOWN type means that drive type cannot be determined. The UINT value that this corresponds to is 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="DRIVE_NO_ROOT_DIR"> <xsd:annotation> <xsd:documentation>The DRIVE_NO_ROOT_DIR type means that the root path is not valid. The UINT value that this corresponds to is 1.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="DRIVE_REMOVABLE"> <xsd:annotation> <xsd:documentation>The DRIVE_REMOVABLE type means that the drive contains removable media. The UINT value that this corresponds to is 2.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="DRIVE_FIXED"> <xsd:annotation> <xsd:documentation>The DRIVE_FIXED type means that the drive contains fixed media. The UINT value that this corresponds to is 3.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="DRIVE_REMOTE"> <xsd:annotation> <xsd:documentation>The DRIVE_REMOTE type means that the drive is a remote drive (i.e. network drive). The UINT value that this corresponds to is 4.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="DRIVE_CDROM"> <xsd:annotation> <xsd:documentation>The DRIVE_CDROM type means that the drive is a CD-ROM drive. The UINT value that this corresponds to is 5.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="DRIVE_RAMDISK"> <xsd:annotation> <xsd:documentation>The DRIVE_RAMDISK type means that the drive is a RAM disk. The UINT value that this corresponds to is 6.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateInterfaceTypeType"> <xsd:annotation> <xsd:documentation>The EntityStateInterfaceTypeType complex type restricts a string value to a specific set of values. These values describe the different interface types. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="MIB_IF_TYPE_ETHERNET"> <xsd:annotation> <xsd:documentation>The MIB_IF_TYPE_ETHERNET type is used to describe ethernet interfaces.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="MIB_IF_TYPE_FDDI"> <xsd:annotation> <xsd:documentation>The MIB_IF_TYPE_FDDI type is used to describe fiber distributed data interfaces (FDDI).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="MIB_IF_TYPE_LOOPBACK"> <xsd:annotation> <xsd:documentation>The MIB_IF_TYPE_LOOPBACK type is used to describe loopback interfaces.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="MIB_IF_TYPE_OTHER"> <xsd:annotation> <xsd:documentation>The MIB_IF_TYPE_OTHER type is used to describe unknown interfaces.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="MIB_IF_TYPE_PPP"> <xsd:annotation> <xsd:documentation>The MIB_IF_TYPE_PPP type is used to describe point-to-point protocol interfaces (PPP).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="MIB_IF_TYPE_SLIP"> <xsd:annotation> <xsd:documentation>The MIB_IF_TYPE_SLIP type is used to describe serial line internet protocol interfaces (SLIP).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="MIB_IF_TYPE_TOKENRING"> <xsd:annotation> <xsd:documentation>The MIB_IF_TYPE_TOKENRING type is used to describe token ring interfaces..</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateFileTypeType"> <xsd:annotation> <xsd:documentation>The EntityStateFileTypeType complex type restricts a string value to a specific set of values. These values describe the type of file being represented. For more information see the GetFileType and GetFileAttributesEx functions as defined by Microsoft. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="FILE_ATTRIBUTE_DIRECTORY"> <xsd:annotation> <xsd:documentation>The handle identifies a directory.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="FILE_TYPE_CHAR"> <xsd:annotation> <xsd:documentation>The specified file is a character file, typically an LPT device or a console.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="FILE_TYPE_DISK"> <xsd:annotation> <xsd:documentation>The specified file is a disk file.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="FILE_TYPE_PIPE"> <xsd:annotation> <xsd:documentation>The specified file is a socket, a named pipe, or an anonymous pipe.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="FILE_TYPE_REMOTE"> <xsd:annotation> <xsd:documentation>Unused.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="FILE_TYPE_UNKNOWN"> <xsd:annotation> <xsd:documentation>Either the type of the specified file is unknown, or the function failed.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityObjectNamingContextType"> <xsd:annotation> <xsd:documentation>The EntityObjectNamingContextType restricts a string value to a specific set of values: domain, configuration, and schema. These values describe the different default naming context found in active directory. A naming context is defined as a single object in the Directory Information Tree (DIT) along with every object in the tree subordinate to it. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityObjectStringType"> <xsd:enumeration value="domain"> <xsd:annotation> <xsd:documentation>The domain naming context contains Active Directory objects present in the specified domain (e.g. users, computers, groups, and other objects).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="configuration"> <xsd:annotation> <xsd:documentation>The configuration naming context contains configuration data that is required for the Active Directory to operate as a directory service.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="schema"> <xsd:annotation> <xsd:documentation>The schema naming context contains all of the Active Directory object definitions.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateNamingContextType"> <xsd:annotation> <xsd:documentation>The EntityStateNamingContextType restricts a string value to a specific set of values: domain, configuration, and schema. These values describe the different default naming context found in active directory. A naming context is defined as a single object in the Directory Information Tree (DIT) along with every object in the tree subordinate to it. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="domain"> <xsd:annotation> <xsd:documentation>The domain naming context contains Active Directory objects present in the specified domain (e.g. users, computers, groups, and other objects).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="configuration"> <xsd:annotation> <xsd:documentation>The configuration naming context contains configuration data that is required for the Active Directory to operate as a directory service.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="schema"> <xsd:annotation> <xsd:documentation>The schema naming context contains all of the Active Directory object definitions.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateNTUserAccountTypeType"> <xsd:annotation> <xsd:documentation>The EntityStateNTUserAccountTypeType restricts a string value to a specific set of values that describe the different types of accounts. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="local"> <xsd:annotation> <xsd:documentation>Local accounts are accounts that were created directly on the machine being tested and should be in the form of machinename\username</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="domain"> <xsd:annotation> <xsd:documentation>Domain accounts are accounts that were created on a domain controller and should be in the form of domain\username</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStatePeTargetMachineType"> <xsd:annotation> <xsd:documentation>The EntityStatePeTargetMachineType enumeration identifies the valid machine targets that can be specified in the PE file header. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="IMAGE_FILE_MACHINE_UNKNOWN"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_UNKNOWN type is used to indicate an unknown machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_ALPHA"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_ALPHA type is used to indicate an Alpha APX machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_ARM"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_ARM type is used to indicate an ARM little endian machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_ALPHA64"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_ALPHA64 type is used to indicate an 64-bit Alpha APX machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_I386"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_I386 type is used to indicate an Intel 386 machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_IA64"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_IA64 type is used to indicate an Intel Itanium machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_M68K"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_M68K type is used to indicate an M68K machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_MIPS16"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_MIPS16 type is used to indicate a MIPS16 machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_MIPSFPU"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_MIPSFPU type is used to indicate an MIPS machine with FPU.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_MIPSFPU16"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_MIPSFPU16 type is used to indicate a MIPS16 machine with FPU.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_POWERPC"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_POWERPC type is used to indicate an Power PC little endian machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_R3000"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_R3000 type is used to indicate a MIPS little endian, 0x160 big endian machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_R4000"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_R4000 type is used to indicate a MIPS little endian machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_R10000"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_10000 type is used to indicate a MIPS little endian machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_SH3"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_SH3 type is used to indicate a Hitachi SH3 machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_SH4"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_SH4 type is used to indicate a Hitachi SH4 machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_FILE_MACHINE_THUMB"> <xsd:annotation> <xsd:documentation>The IMAGE_FILE_MACHINE_THUMB type is used to indicate an ARM or Thumb ("interworking") machine.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStatePeSubsystemType"> <xsd:annotation> <xsd:documentation>The EntityStatePeSubsystemType enumeration identifies the valid subsystem types that can be specified in the PE file header. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="IMAGE_SUBSYSTEM_UNKNOWN"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_UNKNOWN type is used to indicate an unknown subsystem.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_NATIVE"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_NATIVE type is used to indicate that no subsystem is required.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_WINDOWS_GUI"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_WINDOWS_GUI type is used to indicate a Windows graphical user interface (GUI) subsystem.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_WINDOWS_CUI"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_WINDOWS_CUI type is used to indicate a Windows character-mode user interface (CUI) subsystem.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_OS2_CUI"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_OS2_CUI type is used to indicate an OS/2 CUI subsystem.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_POSIX_CUI"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_POSIX_CUI type is used to indicate a POSIX CUI subsystem.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_WINDOWS_CE_GUI"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_WINDOWS_CE_GUI type is used to indicate a Windows CE system.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_EFI_APPLICATION"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_EFI_APPLICATION type is used to indicate an Extensible Firmware Interface (EFI) application.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_EFI_BOOT_SERVICE_DRIVER"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_EFI_BOOT_SERVICE_DRIVER type is used to indicate a EFI driver with boot services.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_EFI_RUNTIME_DRIVER"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_EFI_RUNTIME_DRIVER type is used to indicate a EFI driver with run-time services subsystem.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_EFI_ROM"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_EFI_ROM type is used to indicate an EFI ROM image.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_XBOX"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_XBOX type is used to indicate an Xbox system.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="IMAGE_SUBSYSTEM_WINDOWS_BOOT_APPLICATION"> <xsd:annotation> <xsd:documentation>The IMAGE_SUBSYSTEM_WINDOWS_BOOT_APPLICATION type is used to indicate a boot application.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityObjectProtocolType"> <xsd:annotation> <xsd:documentation>The EntityObjectProtocolType restricts a string value to a specific set of values: TCP and UDP. These values describe the different protocols available to a port. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityObjectStringType"> <xsd:enumeration value="TCP"> <xsd:annotation> <xsd:documentation>The port uses the Transmission Control Protocol (TCP).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="UDP"> <xsd:annotation> <xsd:documentation>The port uses the User Datagram Protocol (UDP).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateProtocolType"> <xsd:annotation> <xsd:documentation>The EntityStateProtocolType restricts a string value to a specific set of values: TCP and UDP. These values describe the different protocols available to a port. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="TCP"> <xsd:annotation> <xsd:documentation>The port uses the Transmission Control Protocol (TCP).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="UDP"> <xsd:annotation> <xsd:documentation>The port uses the User Datagram Protocol (UDP).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityObjectRegistryHiveType"> <xsd:annotation> <xsd:documentation>The EntityObjectRegistryHiveType restricts a string value to a specific set of values: HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, and HKEY_USERS. These values describe the possible hives in the registry. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityObjectStringType"> <xsd:enumeration value="HKEY_CLASSES_ROOT"> <xsd:annotation> <xsd:documentation>This registry subtree contains information that associates file types with programs and configuration data for automation (e.g. COM objects and Visual Basic Programs).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="HKEY_CURRENT_CONFIG"> <xsd:annotation> <xsd:documentation>This registry subtree contains configuration data for the current hardware profile.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="HKEY_CURRENT_USER"> <xsd:annotation> <xsd:documentation>This registry subtree contains the user profile of the user that is currently logged into the system.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="HKEY_LOCAL_MACHINE"> <xsd:annotation> <xsd:documentation>This registry subtree contains information about the local system.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="HKEY_USERS"> <xsd:annotation> <xsd:documentation>This registry subtree contains user-specific data.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateRegistryHiveType"> <xsd:annotation> <xsd:documentation>The EntityStateRegistryHiveType restricts a string value to a specific set of values: HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, and HKEY_USERS. These values describe the possible hives in the registry. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="HKEY_CLASSES_ROOT"> <xsd:annotation> <xsd:documentation>This registry subtree contains information that associates file types with programs and configuration data for automation (e.g. COM objects and Visual Basic Programs).</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="HKEY_CURRENT_CONFIG"> <xsd:annotation> <xsd:documentation>This registry subtree contains configuration data for the current hardware profile.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="HKEY_CURRENT_USER"> <xsd:annotation> <xsd:documentation>This registry subtree contains the user profile of the user that is currently logged into the system.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="HKEY_LOCAL_MACHINE"> <xsd:annotation> <xsd:documentation>This registry subtree contains information about the local system.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="HKEY_USERS"> <xsd:annotation> <xsd:documentation>This registry subtree contains user-specific data.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateRegistryTypeType"> <xsd:annotation> <xsd:documentation>The EntityStateRegistryTypeType complex type defines the different values that are valid for the type entity of a registry state. These values describe the possible types of data stored in a registry key. The empty string is also allowed as a valid value to support an empty element that is found when a variable reference is used within the type entity. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values. Please note that the values identified are for the type entity and are not valid values for the datatype attribute. For information about how to encode registry data in OVAL for each of the different types, please visit the registry_state documentation.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="reg_binary"> <xsd:annotation> <xsd:documentation>The reg_binary type is used by registry keys that specify binary data in any form.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="reg_dword"> <xsd:annotation> <xsd:documentation>The reg_dword type is used by registry keys that specify an unsigned 32-bit integer.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="reg_dword_little_endian"> <xsd:annotation> <xsd:documentation>The reg_dword_little_endian type is used by registry keys that specify an unsigned 32-bit little-endian integer. It is designed to run on little-endian computer architectures.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="reg_dword_big_endian"> <xsd:annotation> <xsd:documentation>The reg_dword_big_endian type is used by registry keys that specify an unsigned 32-bit big-endian integer. It is designed to run on big-endian computer architectures.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="reg_expand_sz"> <xsd:annotation> <xsd:documentation>The reg_expand_sz type is used by registry keys to specify a null-terminated string that contains unexpanded references to environment variables (for example, "%PATH%").</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="reg_link"> <xsd:annotation> <xsd:documentation>The reg_link type is used by the registry keys for null-terminated unicode strings. It is related to target path of a symbolic link created by the RegCreateKeyEx function.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="reg_multi_sz"> <xsd:annotation> <xsd:documentation>The reg_multi_sz type is used by registry keys that specify an array of null-terminated strings, terminated by two null characters.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="reg_none"> <xsd:annotation> <xsd:documentation>The reg_none type is used by registry keys that have no defined value type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="reg_qword"> <xsd:annotation> <xsd:documentation>The reg_qword type is used by registry keys that specify an unsigned 64-bit integer.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="reg_qword_little_endian"> <xsd:annotation> <xsd:documentation>The reg_qword_little_endian type is used by registry keys that specify an unsigned 64-bit integer in little-endian computer architectures.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="reg_sz"> <xsd:annotation> <xsd:documentation>The reg_sz type is used by registry keys that specify a single null-terminated string.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateServiceControlsAcceptedType"> <xsd:annotation> <xsd:documentation>The EntityStateServiceAcceptedControlsType complex type defines the different values that are valid for the controls_accepted entity of a service. Note that the Windows API returns a DWORD value and OVAL uses the constant name that is normally defined for these return values. This is done to increase readability and maintainability of OVAL Definitions. The empty string is also allowed as a valid value to support an empty element that is found when a variable reference is used within the controls_accepted entity. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="SERVICE_ACCEPT_NETBINDCHANGE"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_NETBINDCHANGE type means that the service is a network component and can accept changes in its binding without being stopped or restarted. The DWORD value that this corresponds to is 0x00000010.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_ACCEPT_PARAMCHANGE"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_PARAMCHANGE type means that the service can re-read its startup parameters without being stopped or restarted. The DWORD value that this corresponds to is 0x00000008.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_ACCEPT_PAUSE_CONTINUE"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_PAUSE_CONTINUE type means that the service can be paused or continued. The DWORD value that this corresponds to is 0x00000002.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_ACCEPT_PRESHUTDOWN"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_PRESHUTDOWN type means that the service can receive pre-shutdown notifications. The DWORD value that this corresponds to is 0x00000100.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_ACCEPT_SHUTDOWN"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_SHUTDOWN type means that the service can receive shutdown notifications. The DWORD value that this corresponds to is 0x00000004.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_ACCEPT_STOP"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_STOP type means that the service can be stopped. The DWORD value that this corresponds to is 0x00000001.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_ACCEPT_HARDWAREPROFILECHANGE"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_HARDWAREPROFILECHANGE type means that the service can receive notifications when the system's hardware profile changes. The DWORD value that this corresponds to is 0x00000020.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_ACCEPT_POWEREVENT"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_POWEREVENT type means that the service can receive notifications when the system's power status has changed. The DWORD value that this corresponds to is 0x00000040.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_ACCEPT_SESSIONCHANGE"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_SESSIONCHANGE type means that the service can receive notifications when the system's session status has changed. The DWORD value that this corresponds to is 0x00000080.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_ACCEPT_TIMECHANGE"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_TIMECHANGE type means that the service can receive notifications when the system time changes. The DWORD value that this corresponds to is 0x00000200.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_ACCEPT_TRIGGEREVENT"> <xsd:annotation> <xsd:documentation>The SERVICE_ACCEPT_TRIGGEREVENT type means that the service can receive notifications when an event that the service has registered for occurs on the system. The DWORD value that this corresponds to is 0x00000400.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateServiceCurrentStateType"> <xsd:annotation> <xsd:documentation>The EntityStateServiceCurrentStateType complex type defines the different values that are valid for the current_state entity of a service. Note that the Windows API returns a DWORD value and OVAL uses the constant name that is normally defined for these return values. This is done to increase readability and maintainability of OVAL Definitions. The empty string is also allowed as a valid value to support an empty element that is found when a variable reference is used within the current_state entity. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="SERVICE_CONTINUE_PENDING"> <xsd:annotation> <xsd:documentation>The SERVICE_CONTINUE_PENDING type means that the service has been sent a command to continue, however, the command has not yet been executed. The DWORD value that this corresponds to is 0x00000005.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_PAUSE_PENDING"> <xsd:annotation> <xsd:documentation>The SERVICE_PAUSE_PENDING type means that the service has been sent a command to pause, however, the command has not yet been executed. The DWORD value that this corresponds to is 0x00000006.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_PAUSED"> <xsd:annotation> <xsd:documentation>The SERVICE_PAUSED type means that the service is paused. The DWORD value that this corresponds to is 0x00000007.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_RUNNING"> <xsd:annotation> <xsd:documentation>The SERVICE_RUNNING type means that the service is running. The DWORD value that this corresponds to is 0x00000004.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_START_PENDING"> <xsd:annotation> <xsd:documentation>The SERVICE_START_PENDING type means that the service has been sent a command to start, however, the command has not yet been executed. The DWORD value that this corresponds to is 0x00000002.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_STOP_PENDING"> <xsd:annotation> <xsd:documentation>The SERVICE_STOP_PENDING type means that the service has been sent a command to stop, however, the command has not yet been executed. The DWORD value that this corresponds to is 0x00000003.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_STOPPED"> <xsd:annotation> <xsd:documentation>The SERVICE_STOPPED type means that the service is stopped. The DWORD value that this corresponds to is 0x00000001.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateServiceStartTypeType"> <xsd:annotation> <xsd:documentation>The EntityStateServiceStartTypeType complex type defines the different values that are valid for the start_type entity of a service. Note that the Windows API returns a DWORD value and OVAL uses the constant name that is normally defined for these return values. This is done to increase readability and maintainability of OVAL Definitions. The empty string is also allowed as a valid value to support an empty element that is found when a variable reference is used within the start_type entity. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="SERVICE_AUTO_START"> <xsd:annotation> <xsd:documentation>The SERVICE_AUTO_START type means that the service is started automatically by the Service Control Manager (SCM) during startup. The DWORD value that this corresponds to is 0x00000002.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_BOOT_START"> <xsd:annotation> <xsd:documentation>The SERVICE_BOOT_START type means that the driver service is started by the system loader. The DWORD value that this corresponds to is 0x00000000.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_DEMAND_START"> <xsd:annotation> <xsd:documentation>The SERVICE_DEMAND_START type means that the service is started by the Service Control Manager (SCM) when StartService() is called. The DWORD value that this corresponds to is 0x00000003.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_DISABLED"> <xsd:annotation> <xsd:documentation>The SERVICE_DISABLED type means that the service cannot be started. The DWORD value that this corresponds to is 0x00000004.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_SYSTEM_START"> <xsd:annotation> <xsd:documentation>The SERVICE_SYSTEM_START type means that the service is a device driver started by IoInitSystem(). The DWORD value that this corresponds to is 0x00000001.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateServiceTypeType"> <xsd:annotation> <xsd:documentation>The EntityStateServiceTypeType complex type defines the different values that are valid for the service_type entity of a service. Note that the Windows API returns a DWORD value and OVAL uses the constant name that is normally defined for these return values. This is done to increase readability and maintainability of OVAL Definitions. The empty string is also allowed as a valid value to support an empty element that is found when a variable reference is used within the service_type entity. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="SERVICE_FILE_SYSTEM_DRIVER"> <xsd:annotation> <xsd:documentation>The SERVICE_FILE_SYSTEM_DRIVER type means that the service is a file system driver. The DWORD value that this corresponds to is 0x00000002.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_KERNEL_DRIVER"> <xsd:annotation> <xsd:documentation>The SERVICE_KERNEL_DRIVER type means that the service is a driver. The DWORD value that this corresponds to is 0x00000001.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_WIN32_OWN_PROCESS"> <xsd:annotation> <xsd:documentation>The SERVICE_WIN32_OWN_PROCESS type means that the service runs in its own process. The DWORD value that this corresponds to is 0x00000010.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_WIN32_SHARE_PROCESS"> <xsd:annotation> <xsd:documentation>The SERVICE_WIN32_SHARE_PROCESS type means that the service runs in a process with other services. The DWORD value that this corresponds to is 0x00000020.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SERVICE_INTERACTIVE_PROCESS"> <xsd:annotation> <xsd:documentation>The SERVICE_WIN32_SHARE_PROCESS type means that the service runs in a process with other services. The DWORD value that this corresponds to is 0x00000100.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateSharedResourceTypeType"> <xsd:annotation> <xsd:documentation>The EntityStateSharedResourceTypeType complex type defines the different values that are valid for the type entity of a shared resource state. Note that the Windows API returns a DWORD value and OVAL uses the constant name that is normally defined for these return values. This is done to increase readability and maintainability of OVAL Definitions. The empty string is also allowed as a valid value to support an empty element that is found when a variable reference is used within the type entity. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values.</xsd:documentation> <xsd:documentation>It is also important to note that special shared resources are those reserved for remote administration, interprocess communication, and administrative shares.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="STYPE_DISKTREE"> <xsd:annotation> <xsd:documentation>The STYPE_DISKTREE type means that the shared resource is a disk drive. The DWORD value that this corresponds to is 0x00000000.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_DISKTREE_SPECIAL"> <xsd:annotation> <xsd:documentation>The STYPE_DISKTREE_SPECIAL type means that the shared resource is a special disk drive. The DWORD value that this corresponds to is 0x80000000.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_DISKTREE_TEMPORARY"> <xsd:annotation> <xsd:documentation>The STYPE_DISKTREE_TEMPORARY type means that the shared resource is a temporary disk drive. The DWORD value that this corresponds to is 0x40000000.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_DISKTREE_SPECIAL_TEMPORARY"> <xsd:annotation> <xsd:documentation>The STYPE_DISKTREE_SPECIAL_TEMPORARY type means that the shared resource is a temporary, special disk drive. The DWORD value that this corresponds to is 0xC0000000.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_PRINTQ"> <xsd:annotation> <xsd:documentation>The STYPE_PRINTQ type means that the shared resource is a print queue. The DWORD value that this corresponds to is 0x00000001.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_PRINTQ_SPECIAL"> <xsd:annotation> <xsd:documentation>The STYPE_PRINTQ_SPECIAL type means that the shared resource is a special print queue. The DWORD value that this corresponds to is 0x80000001.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_PRINTQ_TEMPORARY"> <xsd:annotation> <xsd:documentation>The STYPE_PRINTQ_TEMPORARY type means that the shared resource is a temporary print queue. The DWORD value that this corresponds to is 0x40000001.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_PRINTQ_SPECIAL_TEMPORARY"> <xsd:annotation> <xsd:documentation>The STYPE_PRINTQ_SPECIAL_TEMPORARY type means that the shared resource is a temporary, special print queue. The DWORD value that this corresponds to is 0xC0000001.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_DEVICE"> <xsd:annotation> <xsd:documentation>The STYPE_DEVICE type means that the shared resource is a communication device. The DWORD value that this corresponds to is 0x00000002.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_DEVICE_SPECIAL"> <xsd:annotation> <xsd:documentation>The STYPE_DEVICE_SPECIAL type means that the shared resource is a special communication device. The DWORD value that this corresponds to is 0x80000002.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_DEVICE_TEMPORARY"> <xsd:annotation> <xsd:documentation>The STYPE_DEVICE_TEMPORARY type means that the shared resource is a temporary communication device. The DWORD value that this corresponds to is 0x40000002.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_DEVICE_SPECIAL_TEMPORARY"> <xsd:annotation> <xsd:documentation>The STYPE_DEVICE_SPECIAL_TEMPORARY type means that the shared resource is a temporary, special communication device. The DWORD value that this corresponds to is 0xC0000002.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_IPC"> <xsd:annotation> <xsd:documentation>The STYPE_IPC type means that the shared resource is a interprocess communication. The DWORD value that this corresponds to is 0x00000003.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_IPC_SPECIAL"> <xsd:annotation> <xsd:documentation>The STYPE_IPC_SPECIAL type means that the shared resource is a special interprocess communication. The DWORD value that this corresponds to is 0x80000003.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_IPC_TEMPORARY"> <xsd:annotation> <xsd:documentation>The STYPE_IPC_TEMPORARY type means that the shared resource is a temporary interprocess communication. The DWORD value that this corresponds to is 0x40000003.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_IPC_SPECIAL_TEMPORARY"> <xsd:annotation> <xsd:documentation>The STYPE_IPC_SPECIAL_TEMPORARY type means that the shared resource is a temporary, special interprocess communication. The DWORD value that this corresponds to is 0xC0000003.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_SPECIAL"> <xsd:annotation> <xsd:documentation>The STYPE_SPECIAL type means that this is a special share reserved for interprocess communication (IPC$) or remote administration of the server (ADMIN$). Can also refer to administrative shares such as C$, D$, E$, and so forth. The DWORD value that this corresponds to is 0x40000000.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>In version 5.6 of the OVAL Language, the EntityStateSharedResourceTypeType was changed to include all of the different shared resource types as specified in Microsoft's documentation of the shi2_type member of the SHARE_INFO_2 structure. As a result, the STYPE_SPECIAL value by itself is no longer valid because it would actually be equal to the value STYPE_DISKTREE_SPECIAL (0x80000000) which is STYPE_DISKTREE (0x00000000) OR'd with STYPE_SPECIAL (0x80000000).</oval:reason> <oval:comment>This value has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_ssr_stype_special_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:states/win-def:sharedresource_state/win-def:shared_type"> <sch:report test=".='STYPE_SPECIAL'"> DEPRECATED ELEMENT VALUE IN: sharedresource_state ELEMENT VALUE: <sch:value-of select="."/> </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="STYPE_TEMPORARY"> <xsd:annotation> <xsd:documentation>The STYPE_TEMPORARY type means that the shared resource is a temporary share. The DWORD value that this corresponds to is 0x80000000.</xsd:documentation> <xsd:appinfo> <oval:deprecated_info> <oval:version>5.6</oval:version> <oval:reason>In version 5.6 of the OVAL Language, the EntityStateSharedResourceTypeType was changed to include all of the different shared resource types as specified in Microsoft's documentation of the shi2_type member of the SHARE_INFO_2 structure. As a result, the STYPE_TEMPORARY value by itself is no longer valid because it would actually be equal to the value STYPE_DISKTREE_TEMPORARY (0x40000000) which is STYPE_DISKTREE (0x00000000) OR'd with STYPE_TEMPORARY (0x40000000).</oval:reason> <oval:comment>This value has been deprecated and will be removed in version 6.0 of the language.</oval:comment> </oval:deprecated_info> <sch:pattern id="win-def_ssr_stype_temporary_value_dep"> <sch:rule context="oval-def:oval_definitions/oval-def:states/win-def:sharedresource_state/win-def:shared_type"> <sch:report test=".='STYPE_TEMPORARY'"> DEPRECATED ELEMENT VALUE IN: sharedresource_state ELEMENT VALUE: <sch:value-of select="."/> </sch:report> </sch:rule> </sch:pattern> </xsd:appinfo> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityObjectSystemMetricIndexType"> <xsd:annotation> <xsd:documentation>The EntityObjectSystemMetricIndexType complex type defines the different values that are valid for the index entity of a system metric object. These values describe the system metric or configuration setting to be retrieved. The empty string is also allowed as a valid value to support an empty element that is found when a variable reference is used within the index entity. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values. Please note that the values identified are for the index entity and are not valid values for the datatype attribute.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityObjectStringType"> <xsd:enumeration value="SM_ARRANGE"> <xsd:annotation> <xsd:documentation>The flags that specify how the system arranged minimized windows.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CLEANBOOT"> <xsd:annotation> <xsd:documentation>The value that specifies how the system is started.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CMONITORS"> <xsd:annotation> <xsd:documentation>The number of display monitors on a desktop.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CMOUSEBUTTONS"> <xsd:annotation> <xsd:documentation>The number of buttons on a mouse, or zero if no mouse is installed.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXBORDER"> <xsd:annotation> <xsd:documentation>The width of a window border, in pixels. This is equivalent to the SM_CXEDGE value for windows with the 3-D look.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXCURSOR"> <xsd:annotation> <xsd:documentation>The width of a cursor, in pixels. The system cannot create cursors of other sizes.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXDLGFRAME"> <xsd:annotation> <xsd:documentation>This value is the same as SM_CXFIXEDFRAME.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXDOUBLECLK"> <xsd:annotation> <xsd:documentation>The width of the rectangle around the location of a first click in a double-click sequence, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXDRAG"> <xsd:annotation> <xsd:documentation>The number of pixels on either side of a mouse-down point that the mouse pointer can move before a drag operation begins.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXEDGE"> <xsd:annotation> <xsd:documentation>The width of a 3-D border, in pixels. This metric is the 3-D counterpart of SM_CXBORDER.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXFIXEDFRAME"> <xsd:annotation> <xsd:documentation>The thickness of the frame around the perimeter of a window that has a caption but is not sizable, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXFOCUSBORDER"> <xsd:annotation> <xsd:documentation>The width of the left and right edges of the focus rectangle that the DrawFocusRect draws.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXFRAME"> <xsd:annotation> <xsd:documentation>This value is the same as SM_CXSIZEFRAME.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXFULLSCREEN"> <xsd:annotation> <xsd:documentation>The width of the client area for a full-screen window on the primary display monitor, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXHSCROLL"> <xsd:annotation> <xsd:documentation>The width of the arrow bitmap on a horizontal scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXHTHUMB"> <xsd:annotation> <xsd:documentation>The width of the thumb box in a horizontal scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXICON"> <xsd:annotation> <xsd:documentation>The default width of an icon, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXICONSPACING"> <xsd:annotation> <xsd:documentation>The width of a grid cell for items in large icon view, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMAXIMIZED"> <xsd:annotation> <xsd:documentation>The default width, in pixels, of a maximized top-level window on the primary display monitor.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMAXTRACK"> <xsd:annotation> <xsd:documentation>The default maximum width of a window that has a caption and sizing borders, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMENUCHECK"> <xsd:annotation> <xsd:documentation>The width of the default menu check-mark bitmap, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMENUSIZE"> <xsd:annotation> <xsd:documentation>The width of menu bar buttons, such as the child window close button that is used in the multiple document interface, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMIN"> <xsd:annotation> <xsd:documentation>The minimum width of a window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMINIMIZED"> <xsd:annotation> <xsd:documentation>The width of a minimized window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMINSPACING"> <xsd:annotation> <xsd:documentation>The width of a grid cell for a minimized window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMINTRACK"> <xsd:annotation> <xsd:documentation>The minimum tracking width of a window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXPADDEDBORDER"> <xsd:annotation> <xsd:documentation>The amount of border padding for captioned windows, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXSCREEN"> <xsd:annotation> <xsd:documentation>The width of the screen of the primary display monitor, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXSIZE"> <xsd:annotation> <xsd:documentation>The width of a button in a window caption or title bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXSIZEFRAME"> <xsd:annotation> <xsd:documentation>The thickness of the sizing border around the perimeter of a window that can be resized, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXSMICON"> <xsd:annotation> <xsd:documentation>The recommended width of a small icon, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXSMSIZE"> <xsd:annotation> <xsd:documentation>The width of small caption buttons, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXVIRTUALSCREEN"> <xsd:annotation> <xsd:documentation>The width of the virtual screen, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXVSCROLL"> <xsd:annotation> <xsd:documentation>The width of a vertical scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYBORDER"> <xsd:annotation> <xsd:documentation>The height of a window border, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYCAPTION"> <xsd:annotation> <xsd:documentation>The height of a caption area, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYCURSOR"> <xsd:annotation> <xsd:documentation>The height of a cursor, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYDLGFRAME"> <xsd:annotation> <xsd:documentation>This value is the same as SM_CYFIXEDFRAME.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYDOUBLECLK"> <xsd:annotation> <xsd:documentation>The height of the rectangle around the location of a first click in a double-click sequence, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYDRAG"> <xsd:annotation> <xsd:documentation>The number of pixels above and below a mouse-down point that the mouse pointer can move before a drag operation begins.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYEDGE"> <xsd:annotation> <xsd:documentation>The height of a 3-D border, in pixels. This is the 3-D counterpart of SM_CYBORDER.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYFIXEDFRAME"> <xsd:annotation> <xsd:documentation>The thickness of the frame around the perimeter of a window that has a caption but is not sizable, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYFOCUSBORDER"> <xsd:annotation> <xsd:documentation>The height of the top and bottom edges of the focus rectangle drawn by DrawFocusRect. This value is in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYFRAME"> <xsd:annotation> <xsd:documentation>This value is the same as SM_CYSIZEFRAME.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYFULLSCREEN"> <xsd:annotation> <xsd:documentation>The height of the client area for a full-screen window on the primary display monitor, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYHSCROLL"> <xsd:annotation> <xsd:documentation>The height of a horizontal scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYICON"> <xsd:annotation> <xsd:documentation>The default height of an icon, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYICONSPACING"> <xsd:annotation> <xsd:documentation>The height of a grid cell for items in large icon view, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYKANJIWINDOW"> <xsd:annotation> <xsd:documentation>For double byte character set versions of the system, this is the height of the Kanji window at the bottom of the screen, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMAXIMIZED"> <xsd:annotation> <xsd:documentation>The default height, in pixels, of a maximized top-level window on the primary display monitor.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMAXTRACK"> <xsd:annotation> <xsd:documentation>The default maximum height of a window that has a caption and sizing borders, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMENU"> <xsd:annotation> <xsd:documentation>The height of a single-line menu bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMENUCHECK"> <xsd:annotation> <xsd:documentation>The height of the default menu check-mark bitmap, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMENUSIZE"> <xsd:annotation> <xsd:documentation>The height of menu bar buttons, such as the child window close button that is used in the multiple document interface, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMIN"> <xsd:annotation> <xsd:documentation>The minimum height of a window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMINIMIZED"> <xsd:annotation> <xsd:documentation>The height of a minimized window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMINSPACING"> <xsd:annotation> <xsd:documentation>The height of a grid cell for a minimized window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMINTRACK"> <xsd:annotation> <xsd:documentation>The minimum tracking height of a window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSCREEN"> <xsd:annotation> <xsd:documentation>The height of the screen of the primary display monitor, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSIZE"> <xsd:annotation> <xsd:documentation>The height of a button in a window caption or title bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSIZEFRAME"> <xsd:annotation> <xsd:documentation>The thickness of the sizing border around the perimeter of a window that can be resized, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSMCAPTION"> <xsd:annotation> <xsd:documentation>The height of a small caption, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSMICON"> <xsd:annotation> <xsd:documentation>The recommended height of a small icon, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSMSIZE"> <xsd:annotation> <xsd:documentation>The height of small caption buttons, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYVIRTUALSCREEN"> <xsd:annotation> <xsd:documentation>The height of the virtual screen, in pixels. The virtual screen is the bounding rectangle of all display monitors.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYVSCROLL"> <xsd:annotation> <xsd:documentation>The height of the arrow bitmap on a vertical scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYVTHUMB"> <xsd:annotation> <xsd:documentation>The height of the thumb box in a vertical scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_DBCSENABLED"> <xsd:annotation> <xsd:documentation>Nonzero if User32.dll supports DBCS; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_DEBUG"> <xsd:annotation> <xsd:documentation>Nonzero if the debug version of User.exe is installed; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_DIGITIZER"> <xsd:annotation> <xsd:documentation>Nonzero if the current operating system is Windows 7 or Windows Server 2008 R2 and the Tablet PC Input service is started; otherwise, 0. The return value is a bitmask that specifies the type of digitizer input supported by the device.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_IMMENABLED"> <xsd:annotation> <xsd:documentation>Nonzero if Input Method Manager/Input Method Editor features are enabled; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MAXIMUMTOUCHES"> <xsd:annotation> <xsd:documentation>Nonzero if there are digitizers in the system; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MEDIACENTER"> <xsd:annotation> <xsd:documentation>Nonzero if the current operating system is the Windows XP, Media Center Edition, 0 if not.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MENUDROPALIGNMENT"> <xsd:annotation> <xsd:documentation>Nonzero if drop-down menus are right-aligned with the corresponding menu-bar item; 0 if the menus are left-aligned.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MIDEASTENABLED"> <xsd:annotation> <xsd:documentation>Nonzero if the system is enabled for Hebrew and Arabic languages, 0 if not.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MOUSEPRESENT"> <xsd:annotation> <xsd:documentation>Nonzero if a mouse is installed; otherwise, 0. </xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MOUSEHORIZONTALWHEELPRESENT"> <xsd:annotation> <xsd:documentation>Nonzero if a mouse with a horizontal scroll wheel is installed; otherwise 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MOUSEWHEELPRESENT"> <xsd:annotation> <xsd:documentation>Nonzero if a mouse with a vertical scroll wheel is installed; otherwise 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_NETWORK"> <xsd:annotation> <xsd:documentation>The least significant bit is set if a network is present; otherwise, it is cleared.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_PENWINDOWS"> <xsd:annotation> <xsd:documentation>Nonzero if the Microsoft Windows for Pen computing extensions are installed; zero otherwise.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_REMOTECONTROL"> <xsd:annotation> <xsd:documentation>This system metric is used in a Terminal Services environment to determine if the current Terminal Server session is being remotely controlled. Its value is nonzero if the current session is remotely controlled; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_REMOTESESSION"> <xsd:annotation> <xsd:documentation>This system metric is used in a Terminal Services environment. If the calling process is associated with a Terminal Services client session, the return value is nonzero. If the calling process is associated with the Terminal Services console session, the return value is 0. </xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SAMEDISPLAYFORMAT"> <xsd:annotation> <xsd:documentation>Nonzero if all the display monitors have the same color format, otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SECURE"> <xsd:annotation> <xsd:documentation>This system metric should be ignored; it always returns 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SERVERR2"> <xsd:annotation> <xsd:documentation>The build number if the system is Windows Server 2003 R2; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SHOWSOUNDS"> <xsd:annotation> <xsd:documentation>Nonzero if the user requires an application to present information visually in situations where it would otherwise present the information only in audible form; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SHUTTINGDOWN"> <xsd:annotation> <xsd:documentation>Nonzero if the current session is shutting down; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SLOWMACHINE"> <xsd:annotation> <xsd:documentation>Nonzero if the computer has a low-end (slow) processor; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_STARTER"> <xsd:annotation> <xsd:documentation>Nonzero if the current operating system is Windows 7 Starter Edition, Windows Vista Starter, or Windows XP Starter Edition; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SWAPBUTTON"> <xsd:annotation> <xsd:documentation>Nonzero if the meanings of the left and right mouse buttons are swapped; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_TABLETPC"> <xsd:annotation> <xsd:documentation>Nonzero if the current operating system is the Windows XP Tablet PC edition or if the current operating system is Windows Vista or Windows 7 and the Tablet PC Input service is started; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_XVIRTUALSCREEN"> <xsd:annotation> <xsd:documentation>The coordinates for the left side of the virtual screen.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_YVIRTUALSCREEN"> <xsd:annotation> <xsd:documentation>The coordinates for the top of the virtual screen.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateSystemMetricIndexType"> <xsd:annotation> <xsd:documentation>The EntityStateSystemMetricIndexType complex type defines the different values that are valid for the index entity of a systemmetric_state. These values describe the system metric or configuration setting to be retrieved. The empty string is also allowed as a valid value to support an empty element that is found when a variable reference is used within the index entity. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values. Please note that the values identified are for the index entity and are not valid values for the datatype attribute.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="SM_ARRANGE"> <xsd:annotation> <xsd:documentation>The flags that specify how the system arranged minimized windows.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CLEANBOOT"> <xsd:annotation> <xsd:documentation>The value that specifies how the system is started.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CMONITORS"> <xsd:annotation> <xsd:documentation>The number of display monitors on a desktop.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CMOUSEBUTTONS"> <xsd:annotation> <xsd:documentation>The number of buttons on a mouse, or zero if no mouse is installed.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXBORDER"> <xsd:annotation> <xsd:documentation>The width of a window border, in pixels. This is equivalent to the SM_CXEDGE value for windows with the 3-D look.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXCURSOR"> <xsd:annotation> <xsd:documentation>The width of a cursor, in pixels. The system cannot create cursors of other sizes.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXDLGFRAME"> <xsd:annotation> <xsd:documentation>This value is the same as SM_CXFIXEDFRAME.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXDOUBLECLK"> <xsd:annotation> <xsd:documentation>The width of the rectangle around the location of a first click in a double-click sequence, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXDRAG"> <xsd:annotation> <xsd:documentation>The number of pixels on either side of a mouse-down point that the mouse pointer can move before a drag operation begins.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXEDGE"> <xsd:annotation> <xsd:documentation>The width of a 3-D border, in pixels. This metric is the 3-D counterpart of SM_CXBORDER.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXFIXEDFRAME"> <xsd:annotation> <xsd:documentation>The thickness of the frame around the perimeter of a window that has a caption but is not sizable, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXFOCUSBORDER"> <xsd:annotation> <xsd:documentation>The width of the left and right edges of the focus rectangle that the DrawFocusRect draws.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXFRAME"> <xsd:annotation> <xsd:documentation>This value is the same as SM_CXSIZEFRAME.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXFULLSCREEN"> <xsd:annotation> <xsd:documentation>The width of the client area for a full-screen window on the primary display monitor, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXHSCROLL"> <xsd:annotation> <xsd:documentation>The width of the arrow bitmap on a horizontal scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXHTHUMB"> <xsd:annotation> <xsd:documentation>The width of the thumb box in a horizontal scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXICON"> <xsd:annotation> <xsd:documentation>The default width of an icon, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXICONSPACING"> <xsd:annotation> <xsd:documentation>The width of a grid cell for items in large icon view, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMAXIMIZED"> <xsd:annotation> <xsd:documentation>The default width, in pixels, of a maximized top-level window on the primary display monitor.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMAXTRACK"> <xsd:annotation> <xsd:documentation>The default maximum width of a window that has a caption and sizing borders, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMENUCHECK"> <xsd:annotation> <xsd:documentation>The width of the default menu check-mark bitmap, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMENUSIZE"> <xsd:annotation> <xsd:documentation>The width of menu bar buttons, such as the child window close button that is used in the multiple document interface, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMIN"> <xsd:annotation> <xsd:documentation>The minimum width of a window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMINIMIZED"> <xsd:annotation> <xsd:documentation>The width of a minimized window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMINSPACING"> <xsd:annotation> <xsd:documentation>The width of a grid cell for a minimized window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXMINTRACK"> <xsd:annotation> <xsd:documentation>The minimum tracking width of a window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXPADDEDBORDER"> <xsd:annotation> <xsd:documentation>The amount of border padding for captioned windows, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXSCREEN"> <xsd:annotation> <xsd:documentation>The width of the screen of the primary display monitor, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXSIZE"> <xsd:annotation> <xsd:documentation>The width of a button in a window caption or title bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXSIZEFRAME"> <xsd:annotation> <xsd:documentation>The thickness of the sizing border around the perimeter of a window that can be resized, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXSMICON"> <xsd:annotation> <xsd:documentation>The recommended width of a small icon, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXSMSIZE"> <xsd:annotation> <xsd:documentation>The width of small caption buttons, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXVIRTUALSCREEN"> <xsd:annotation> <xsd:documentation>The width of the virtual screen, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CXVSCROLL"> <xsd:annotation> <xsd:documentation>The width of a vertical scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYBORDER"> <xsd:annotation> <xsd:documentation>The height of a window border, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYCAPTION"> <xsd:annotation> <xsd:documentation>The height of a caption area, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYCURSOR"> <xsd:annotation> <xsd:documentation>The height of a cursor, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYDLGFRAME"> <xsd:annotation> <xsd:documentation>This value is the same as SM_CYFIXEDFRAME.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYDOUBLECLK"> <xsd:annotation> <xsd:documentation>The height of the rectangle around the location of a first click in a double-click sequence, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYDRAG"> <xsd:annotation> <xsd:documentation>The number of pixels above and below a mouse-down point that the mouse pointer can move before a drag operation begins.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYEDGE"> <xsd:annotation> <xsd:documentation>The height of a 3-D border, in pixels. This is the 3-D counterpart of SM_CYBORDER.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYFIXEDFRAME"> <xsd:annotation> <xsd:documentation>The thickness of the frame around the perimeter of a window that has a caption but is not sizable, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYFOCUSBORDER"> <xsd:annotation> <xsd:documentation>The height of the top and bottom edges of the focus rectangle drawn by DrawFocusRect. This value is in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYFRAME"> <xsd:annotation> <xsd:documentation>This value is the same as SM_CYSIZEFRAME.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYFULLSCREEN"> <xsd:annotation> <xsd:documentation>The height of the client area for a full-screen window on the primary display monitor, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYHSCROLL"> <xsd:annotation> <xsd:documentation>The height of a horizontal scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYICON"> <xsd:annotation> <xsd:documentation>The default height of an icon, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYICONSPACING"> <xsd:annotation> <xsd:documentation>The height of a grid cell for items in large icon view, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYKANJIWINDOW"> <xsd:annotation> <xsd:documentation>For double byte character set versions of the system, this is the height of the Kanji window at the bottom of the screen, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMAXIMIZED"> <xsd:annotation> <xsd:documentation>The default height, in pixels, of a maximized top-level window on the primary display monitor.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMAXTRACK"> <xsd:annotation> <xsd:documentation>The default maximum height of a window that has a caption and sizing borders, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMENU"> <xsd:annotation> <xsd:documentation>The height of a single-line menu bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMENUCHECK"> <xsd:annotation> <xsd:documentation>The height of the default menu check-mark bitmap, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMENUSIZE"> <xsd:annotation> <xsd:documentation>The height of menu bar buttons, such as the child window close button that is used in the multiple document interface, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMIN"> <xsd:annotation> <xsd:documentation>The minimum height of a window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMINIMIZED"> <xsd:annotation> <xsd:documentation>The height of a minimized window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMINSPACING"> <xsd:annotation> <xsd:documentation>The height of a grid cell for a minimized window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYMINTRACK"> <xsd:annotation> <xsd:documentation>The minimum tracking height of a window, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSCREEN"> <xsd:annotation> <xsd:documentation>The height of the screen of the primary display monitor, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSIZE"> <xsd:annotation> <xsd:documentation>The height of a button in a window caption or title bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSIZEFRAME"> <xsd:annotation> <xsd:documentation>The thickness of the sizing border around the perimeter of a window that can be resized, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSMCAPTION"> <xsd:annotation> <xsd:documentation>The height of a small caption, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSMICON"> <xsd:annotation> <xsd:documentation>The recommended height of a small icon, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYSMSIZE"> <xsd:annotation> <xsd:documentation>The height of small caption buttons, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYVIRTUALSCREEN"> <xsd:annotation> <xsd:documentation>The height of the virtual screen, in pixels. The virtual screen is the bounding rectangle of all display monitors.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYVSCROLL"> <xsd:annotation> <xsd:documentation>The height of the arrow bitmap on a vertical scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_CYVTHUMB"> <xsd:annotation> <xsd:documentation>The height of the thumb box in a vertical scroll bar, in pixels.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_DBCSENABLED"> <xsd:annotation> <xsd:documentation>Nonzero if User32.dll supports DBCS; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_DEBUG"> <xsd:annotation> <xsd:documentation>Nonzero if the debug version of User.exe is installed; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_DIGITIZER"> <xsd:annotation> <xsd:documentation>Nonzero if the current operating system is Windows 7 or Windows Server 2008 R2 and the Tablet PC Input service is started; otherwise, 0. The return value is a bitmask that specifies the type of digitizer input supported by the device.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_IMMENABLED"> <xsd:annotation> <xsd:documentation>Nonzero if Input Method Manager/Input Method Editor features are enabled; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MAXIMUMTOUCHES"> <xsd:annotation> <xsd:documentation>Nonzero if there are digitizers in the system; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MEDIACENTER"> <xsd:annotation> <xsd:documentation>Nonzero if the current operating system is the Windows XP, Media Center Edition, 0 if not.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MENUDROPALIGNMENT"> <xsd:annotation> <xsd:documentation>Nonzero if drop-down menus are right-aligned with the corresponding menu-bar item; 0 if the menus are left-aligned.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MIDEASTENABLED"> <xsd:annotation> <xsd:documentation>Nonzero if the system is enabled for Hebrew and Arabic languages, 0 if not.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MOUSEPRESENT"> <xsd:annotation> <xsd:documentation>Nonzero if a mouse is installed; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MOUSEHORIZONTALWHEELPRESENT"> <xsd:annotation> <xsd:documentation>Nonzero if a mouse with a horizontal scroll wheel is installed; otherwise 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_MOUSEWHEELPRESENT"> <xsd:annotation> <xsd:documentation>Nonzero if a mouse with a vertical scroll wheel is installed; otherwise 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_NETWORK"> <xsd:annotation> <xsd:documentation>The least significant bit is set if a network is present; otherwise, it is cleared.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_PENWINDOWS"> <xsd:annotation> <xsd:documentation>Nonzero if the Microsoft Windows for Pen computing extensions are installed; zero otherwise.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_REMOTECONTROL"> <xsd:annotation> <xsd:documentation>This system metric is used in a Terminal Services environment to determine if the current Terminal Server session is being remotely controlled. Its value is nonzero if the current session is remotely controlled; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_REMOTESESSION"> <xsd:annotation> <xsd:documentation>This system metric is used in a Terminal Services environment. If the calling process is associated with a Terminal Services client session, the return value is nonzero. If the calling process is associated with the Terminal Services console session, the return value is 0. </xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SAMEDISPLAYFORMAT"> <xsd:annotation> <xsd:documentation>Nonzero if all the display monitors have the same color format, otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SECURE"> <xsd:annotation> <xsd:documentation>This system metric should be ignored; it always returns 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SERVERR2"> <xsd:annotation> <xsd:documentation>The build number if the system is Windows Server 2003 R2; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SHOWSOUNDS"> <xsd:annotation> <xsd:documentation>Nonzero if the user requires an application to present information visually in situations where it would otherwise present the information only in audible form; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SHUTTINGDOWN"> <xsd:annotation> <xsd:documentation>Nonzero if the current session is shutting down; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SLOWMACHINE"> <xsd:annotation> <xsd:documentation>Nonzero if the computer has a low-end (slow) processor; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_STARTER"> <xsd:annotation> <xsd:documentation>Nonzero if the current operating system is Windows 7 Starter Edition, Windows Vista Starter, or Windows XP Starter Edition; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_SWAPBUTTON"> <xsd:annotation> <xsd:documentation>Nonzero if the meanings of the left and right mouse buttons are swapped; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_TABLETPC"> <xsd:annotation> <xsd:documentation>Nonzero if the current operating system is the Windows XP Tablet PC edition or if the current operating system is Windows Vista or Windows 7 and the Tablet PC Input service is started; otherwise, 0.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_XVIRTUALSCREEN"> <xsd:annotation> <xsd:documentation>The coordinates for the left side of the virtual screen.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SM_YVIRTUALSCREEN"> <xsd:annotation> <xsd:documentation>The coordinates for the top of the virtual screen.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityObjectGUIDType"> <xsd:annotation> <xsd:documentation>The EntityObjectGUIDType restricts a string value to a representation of a GUID, used for module ID. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the specified pattern restriction.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityObjectStringType"> <xsd:pattern value="(\{[a-fA-F0-9]{8}-[a-fA-F0-9]{4}-[a-fA-F0-9]{4}-[a-fA-F0-9]{4}-[a-fA-F0-9]{12}\}){0,}"/> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateGUIDType"> <xsd:annotation> <xsd:documentation>The EntityStateGUIDType restricts a string value to a representation of a GUID, used for module ID. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the specified pattern restriction.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:pattern value="(\{[a-fA-F0-9]{8}-[a-fA-F0-9]{4}-[a-fA-F0-9]{4}-[a-fA-F0-9]{4}-[a-fA-F0-9]{12}\}){0,}"/> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityObjectCmdletVerbType"> <xsd:annotation> <xsd:documentation>The EntityObjectCmdletVerbType restricts a string value to a set of allow cmdlet verbs. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the specified pattern restriction.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityObjectStringType"> <xsd:enumeration value="Approve"> <xsd:annotation> <xsd:documentation>The Approve verb confirms or agrees to the status of a resource or process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Assert"> <xsd:annotation> <xsd:documentation>The Assert verb affirms the state of a resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Compare"> <xsd:annotation> <xsd:documentation>The Compare verb evaluates the data from one resource against the data from another resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Confirm"> <xsd:annotation> <xsd:documentation>The Confirm verb acknowledges, verifies, or validates, the state of a resource or process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Find"> <xsd:annotation> <xsd:documentation>The Find verb looks for an object in a container that is unknown, implied, optional, or specified.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Get"> <xsd:annotation> <xsd:documentation>The Get verb specifies an action that retrieves a resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Import"> <xsd:annotation> <xsd:documentation>The Import verb creates a resource from data that is stored in a persistent data store (such as a file) or in an interchange format.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Measure"> <xsd:annotation> <xsd:documentation>The Measure verb identifies resources that are consumed by a specified operation, or retrieves statistics about a resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Read"> <xsd:annotation> <xsd:documentation>The Read verb acquires information from a source.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Request"> <xsd:annotation> <xsd:documentation>The Request verb asks for a resource or asks for permissions.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Resolve"> <xsd:annotation> <xsd:documentation>The Resolve verb maps a shorthand representation of a resource to a more complete representation.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Search"> <xsd:annotation> <xsd:documentation>The Search verb creates a reference to a resource in a container.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Select"> <xsd:annotation> <xsd:documentation>The Select verb locates a resource in a container.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Show"> <xsd:annotation> <xsd:documentation>The Show verb makes a resource visible to the user.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Test"> <xsd:annotation> <xsd:documentation>The Test verb verifies the operation or consistency of a resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Trace"> <xsd:annotation> <xsd:documentation>The Trace verb tracks the activities of a resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Watch"> <xsd:annotation> <xsd:documentation>The Watch verb continually inspects or monitors a resource for changes.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateCmdletVerbType"> <xsd:annotation> <xsd:documentation>The EntityStateCmdletVerbType restricts a string value to a set of allow cmdlet verbs. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the specified pattern restriction.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="Approve"> <xsd:annotation> <xsd:documentation>The Approve verb confirms or agrees to the status of a resource or process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Assert"> <xsd:annotation> <xsd:documentation>The Assert verb affirms the state of a resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Compare"> <xsd:annotation> <xsd:documentation>The Compare verb evaluates the data from one resource against the data from another resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Confirm"> <xsd:annotation> <xsd:documentation>The Confirm verb acknowledges, verifies, or validates, the state of a resource or process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Find"> <xsd:annotation> <xsd:documentation>The Find verb looks for an object in a container that is unknown, implied, optional, or specified.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Get"> <xsd:annotation> <xsd:documentation>The Get verb specifies an action that retrieves a resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Import"> <xsd:annotation> <xsd:documentation>The Import verb creates a resource from data that is stored in a persistent data store (such as a file) or in an interchange format.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Measure"> <xsd:annotation> <xsd:documentation>The Measure verb identifies resources that are consumed by a specified operation, or retrieves statistics about a resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Read"> <xsd:annotation> <xsd:documentation>The Read verb acquires information from a source.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Request"> <xsd:annotation> <xsd:documentation>The Request verb asks for a resource or asks for permissions.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Resolve"> <xsd:annotation> <xsd:documentation>The Resolve verb maps a shorthand representation of a resource to a more complete representation.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Search"> <xsd:annotation> <xsd:documentation>The Search verb creates a reference to a resource in a container.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Select"> <xsd:annotation> <xsd:documentation>The Select verb locates a resource in a container.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Show"> <xsd:annotation> <xsd:documentation>The Show verb makes a resource visible to the user.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Test"> <xsd:annotation> <xsd:documentation>The Test verb verifies the operation or consistency of a resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Trace"> <xsd:annotation> <xsd:documentation>The Trace verb tracks the activities of a resource.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="Watch"> <xsd:annotation> <xsd:documentation>The Watch verb continually inspects or monitors a resource for changes.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateWindowsViewType"> <xsd:annotation> <xsd:documentation>The EntityStateWindowsViewType restricts a string value to a specific set of values: 32-bit and 64-bit. These values describe the different values possible for the windows view behavior.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="32_bit"> <xsd:annotation> <xsd:documentation>Indicates the 32_bit windows view.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="64_bit"> <xsd:annotation> <xsd:documentation>Indicates the 64_bit windows view.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityObjectUserRightType"> <xsd:annotation> <xsd:documentation>The EntityObjectUserRightType restricts a string value to a specific set of values that describe the different user rights/privileges. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the specified pattern restriction.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityObjectStringType"> <xsd:enumeration value="SE_ASSIGNPRIMARYTOKEN_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to assign the primary token of a process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_AUDIT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to generate audit-log entries.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_BACKUP_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to perform backup operations.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CHANGE_NOTIFY_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to receive notifications of changes to files or directories.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CREATE_GLOBAL_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create named file mapping objects in the global namespace during Terminal Services sessions.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CREATE_PAGEFILE_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create a paging file.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CREATE_PERMANENT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create a permanent object.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CREATE_SYMBOLIC_LINK_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create a symbolic link.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CREATE_TOKEN_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create a primary token.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DEBUG_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to debug and adjust the memory of a process owned by another account.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_ENABLE_DELEGATION_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to mark user and computer accounts as trusted for delegation.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_IMPERSONATE_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to impersonate.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_INC_BASE_PRIORITY_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to increase the base priority of a process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_INCREASE_QUOTA_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to increase the quota assigned to a process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_INC_WORKING_SET_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to allocate more memory for applications that run in the context of users.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_LOAD_DRIVER_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to load or unload a device driver.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_LOCK_MEMORY_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to lock physical pages in memory.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_MACHINE_ACCOUNT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create a computer account.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_MANAGE_VOLUME_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to enable volume management privileges.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_PROF_SINGLE_PROCESS_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to gather profiling information for a single process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_RELABEL_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to modify the mandatory integrity level of an object.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_REMOTE_SHUTDOWN_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to shut down a system using a network request.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_RESTORE_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to perform restore operations.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SECURITY_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to perform a number of security-related functions, such as controlling and viewing audit messages.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SHUTDOWN_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to shut down a local system.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SYNC_AGENT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required for a domain controller to use the Lightweight Directory Access Protocol directory synchronization services.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SYSTEM_ENVIRONMENT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SYSTEM_PROFILE_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to gather profiling information for the entire system.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SYSTEMTIME_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to modify the system time.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_TAKE_OWNERSHIP_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to take ownership of an object without being granted discretionary access.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_TCB_NAME"> <xsd:annotation> <xsd:documentation>This privilege identifies its holder as part of the trusted computer base.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_TIME_ZONE_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to adjust the time zone associated with the computer's internal clock.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_TRUSTED_CREDMAN_ACCESS_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to access Credential Manager as a trusted caller.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_UNDOCK_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to undock a laptop.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_UNSOLICITED_INPUT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to read unsolicited input from a terminal device.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_BATCH_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right is required for an account to log on using the batch logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DENY_BATCH_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right explicitly denies an account the right to log on using the batch logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DENY_INTERACTIVE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right explicitly denies an account the right to log on using the interactive logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DENY_NETWORK_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right explicitly denies an account the right to log on using the network logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DENY_REMOTE_INTERACTIVE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right explicitly denies an account the right to log on remotely using the interactive logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DENY_SERVICE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right explicitly denies an account the right to log on using the service logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_INTERACTIVE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right is required for an account to log on using the interactive logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_NETWORK_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right is required for an account to log on using the network logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_REMOTE_INTERACTIVE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right is required for an account to log on remotely using the interactive logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SERVICE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right is required for an account to log on using the service logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> <xsd:complexType name="EntityStateUserRightType"> <xsd:annotation> <xsd:documentation>The EntityStateUserRightType restricts a string value to a specific set of values that describe the different user rights/privileges. The empty string is also allowed to support empty element associated with variable references. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the specified pattern restriction.</xsd:documentation> </xsd:annotation> <xsd:simpleContent> <xsd:restriction base="oval-def:EntityStateStringType"> <xsd:enumeration value="SE_ASSIGNPRIMARYTOKEN_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to assign the primary token of a process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_AUDIT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to generate audit-log entries.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_BACKUP_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to perform backup operations.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CHANGE_NOTIFY_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to receive notifications of changes to files or directories.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CREATE_GLOBAL_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create named file mapping objects in the global namespace during Terminal Services sessions.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CREATE_PAGEFILE_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create a paging file.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CREATE_PERMANENT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create a permanent object.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CREATE_SYMBOLIC_LINK_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create a symbolic link.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_CREATE_TOKEN_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create a primary token.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DEBUG_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to debug and adjust the memory of a process owned by another account.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_ENABLE_DELEGATION_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to mark user and computer accounts as trusted for delegation.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_IMPERSONATE_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to impersonate.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_INC_BASE_PRIORITY_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to increase the base priority of a process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_INCREASE_QUOTA_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to increase the quota assigned to a process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_INC_WORKING_SET_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to allocate more memory for applications that run in the context of users.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_LOAD_DRIVER_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to load or unload a device driver.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_LOCK_MEMORY_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to lock physical pages in memory.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_MACHINE_ACCOUNT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to create a computer account.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_MANAGE_VOLUME_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to enable volume management privileges.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_PROF_SINGLE_PROCESS_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to gather profiling information for a single process.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_RELABEL_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to modify the mandatory integrity level of an object.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_REMOTE_SHUTDOWN_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to shut down a system using a network request.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_RESTORE_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to perform restore operations.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SECURITY_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to perform a number of security-related functions, such as controlling and viewing audit messages.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SHUTDOWN_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to shut down a local system.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SYNC_AGENT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required for a domain controller to use the Lightweight Directory Access Protocol directory synchronization services.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SYSTEM_ENVIRONMENT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SYSTEM_PROFILE_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to gather profiling information for the entire system.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SYSTEMTIME_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to modify the system time.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_TAKE_OWNERSHIP_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to take ownership of an object without being granted discretionary access.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_TCB_NAME"> <xsd:annotation> <xsd:documentation>This privilege identifies its holder as part of the trusted computer base.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_TIME_ZONE_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to adjust the time zone associated with the computer's internal clock.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_TRUSTED_CREDMAN_ACCESS_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to access Credential Manager as a trusted caller.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_UNDOCK_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to undock a laptop.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_UNSOLICITED_INPUT_NAME"> <xsd:annotation> <xsd:documentation>This privilege is required to read unsolicited input from a terminal device.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_BATCH_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right is required for an account to log on using the batch logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DENY_BATCH_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right explicitly denies an account the right to log on using the batch logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DENY_INTERACTIVE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right explicitly denies an account the right to log on using the interactive logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DENY_NETWORK_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right explicitly denies an account the right to log on using the network logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DENY_REMOTE_INTERACTIVE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right explicitly denies an account the right to log on remotely using the interactive logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_DENY_SERVICE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right explicitly denies an account the right to log on using the service logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_INTERACTIVE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right is required for an account to log on using the interactive logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_NETWORK_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right is required for an account to log on using the network logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_REMOTE_INTERACTIVE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right is required for an account to log on remotely using the interactive logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value="SE_SERVICE_LOGON_NAME"> <xsd:annotation> <xsd:documentation>This account right is required for an account to log on using the service logon type.</xsd:documentation> </xsd:annotation> </xsd:enumeration> <xsd:enumeration value=""> <xsd:annotation> <xsd:documentation>The empty string value is permitted here to allow for empty elements associated with variable references.</xsd:documentation> </xsd:annotation> </xsd:enumeration> </xsd:restriction> </xsd:simpleContent> </xsd:complexType> </xsd:schema>
Close