UCF STIG Viewer Logo

Remote control of a Terminal Service session is allowed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3341 3.066 SV-29705r1_rule ECSC-1 High
Description
This setting is used to control the rules for remote control of Terminal Services user sessions. This is a Category 1 finding because remote control of sessions could permit an unauthorized user to access sensitive information on the controlled system.
STIG Date
Windows 2003 Member Server Security Technical Implementation Guide 2014-01-07

Details

Check Text ( C-161r1_chk )
If the following registry value does not exist or is not configured as specified, this is a finding:

Registry Hive: HKEY_LOCAL_MACHINE
Subkey: \Software\Policies\Microsoft\Windows NT\Terminal Services\
Value Name: Shadow
Type: REG_DWORD
Value: 0

Fix Text (F-126r1_fix)
Configure the system to prevent remote control of the computer by setting the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services, “Sets rules for remote control of Terminal Services user settings” to “Enabled” and the “Options” will be set to “No remote control allowed”.