UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Remote control of a Terminal Service session is allowed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3341 3.066 SV-29705r1_rule ECSC-1 High
Description
This setting is used to control the rules for remote control of Terminal Services user sessions. This is a Category 1 finding because remote control of sessions could permit an unauthorized user to access sensitive information on the controlled system.
STIG Date
Windows 2003 Domain Controller Security Technical Implementation Guide 2014-12-13

Details

Check Text ( None )
None
Fix Text (F-126r1_fix)
Configure the system to prevent remote control of the computer by setting the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services, “Sets rules for remote control of Terminal Services user settings” to “Enabled” and the “Options” will be set to “No remote control allowed”.