UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system can be removed from the docking station without logging on first.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3372 3.069 SV-3372r2_rule ECSC-1 Medium
Description
This setting controls the ability to undock the system without having to log on. Since the removal of a computer should be controlled, users should have to log on before undocking the computer to ensure that they have the appropriate rights to undock the system. In addition to software security settings, physical security should be in place to prevent unauthorized removal of computers.
STIG Date
Windows 2003 Domain Controller Security Technical Implementation Guide 2015-06-23

Details

Check Text ( None )
None
Fix Text (F-130r1_fix)
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Devices: Allow Undock Without Having to Log On” to “Disabled”.