UCF STIG Viewer Logo

IPSec Exemptions are limited.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14232 3.127 SV-16835r1_rule Low
Description
This check verifies that Windows is configured to limit IPSec exemptions.
STIG Date
Windows 2008 Member Server Security Technical Implementation Guide 2019-06-18

Details

Check Text ( C-16253r1_chk )
Analyze the system using the Security Configuration and Analysis snap-in. Expand the Security Configuration and Analysis tree view.

Navigate to Local Policies -> Security Options.

If the value for “MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic” is not set to “Only ISAKMP is exempt (recommended for Windows Server 2003)”, then this is a finding.

The policy referenced configures the following registry value:

Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \System\CurrentControlSet\Services\IPSEC\

Value Name: NoDefaultExempt

Value Type: REG_DWORD
Value: 3
Fix Text (F-15854r1_fix)
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic” to “Only ISAKMP is exempt (recommended for Windows Server 2003)”.