UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Kerberos policy option must be configured to enforce user logon restrictions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-2376 AD.4029_2008 SV-28494r1_rule ECSC-1 Medium
Description
This policy setting determines whether the Kerberos Key Distribution Center (KDC) validates every request for a session ticket against the user rights policy of the target computer. The policy is enabled by default which is the most secure setting for validating access to target resources is not circumvented.
STIG Date
Windows 2008 Domain Controller Security Technical Implementation Guide 2013-07-03

Details

Check Text ( C-468r1_chk )
1. Analyze the system using the Security Configuration and Analysis tool.

2. Expand the Security Configuration and Analysis tree view.

3. Navigate to Account Policies -> Kerberos Policy.

4. If the “Enforce user logon restrictions” is not set to ‘Enabled’, then this is a finding.
Fix Text (F-28443r1_fix)
Navigate to Account Policies -> Kerberos Policy and set “Enforce user logon restrictions” to "Enabled".