UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Terminal Services / Remote Desktop Services - Prevent users from connecting using Terminal Services or Remote Desktop.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14248 5.117 SV-25259r1_rule ECSC-1 Medium
Description
This check verifies that the system is configured to prevent users from connecting to a computer using Terminal Services or Remote Desktop.
STIG Date
Windows 7 Security Technical Implementation Guide 2013-03-14

Details

Check Text ( C-11594r1_chk )
If the following registry value doesn’t exist or is not configured as specified, this is a finding:

Registry Hive: HKEY_LOCAL_MACHINE
Subkey: \Software\Policies\Microsoft\Windows NT\Terminal Services\

Value Name: fDenyTSConnections

Type: REG_DWORD
Value: 1

Documentable Explanation: If terminal services/remote desktop for remote administration is being used, then this would not be a finding. This requirement needs to be documented with the IAO.
Fix Text (F-22927r1_fix)
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Connections “Allow users to connect remotely using Remote Desktop Services” to “Disabled.