UCF STIG Viewer Logo

SharePoint sites must not use NTLM.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29301 SHPT-00-000531 SV-37822r3_rule Medium
Description
An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Techniques used to address this include protocols using nonce's or challenges (e.g., TLS, WS_Security), and time synchronous or challenge-response one-time authenticators. SharePoint must not use NTLM in the authentication process.
STIG Date
MS SharePoint 2010 Security Technical Implementation Guide 2019-01-02

Details

Check Text ( C-37023r5_chk )
SharePoint must be configured to not use NTLM.

Review the SharePoint server configuration to ensure replay-resistant authentication mechanisms for network access to privileged accounts are used.

SharePoint must be configured to use Kerberos as the primary authentication provider.

Log on to the server.

Click Start.

Type Internet Information Services Manager in the Search Bar, click Enter.

Expand the server node in the tree view and expand the "Sites" node.

*For each...* Select a SharePoint Web Application site to review.

In the "IIS" section, double-click Authentication and then select "Windows Authentication".

Right-click "Windows Authentication" and select "Providers".

Ensure "Negotiate" is listed first. If NTLM is listed first in the Enabled Providers box, this is a finding.
Fix Text (F-32291r5_fix)

1. Using IIS Manager (IIS 7), navigate to view the SharePoint Web Application sites.
2. Select a SharePoint Web Application site to configure.
3. In the IIS section, double-click Authentication and select Windows Authentication.
4. Right-click Windows Authentication and select Providers.
5. Add Negotiate to the list in the Enabled Providers box.
6. Remove NTLM from the list in the Enabled Providers box.