Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-26473 | WINUR-000006 | SV-35928r3_rule | Medium |
Description |
---|
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. Accounts with the "Allow log on through Remote Desktop Services" user right can access a system through Remote Desktop. |
STIG | Date |
---|---|
Windows 7 Security Technical Implementation Guide | 2017-01-27 |
Check Text ( None ) |
---|
None |
Fix Text (F-67145r2_fix) |
---|
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on through Remote Desktop Services" to be defined but containing no entries (blank). Administrators may be granted this user right if Remote Desktop Services is necessary for remote administration. Restricted Admin mode must be used. This must be document with the ISSO. See Microsoft article KB2871997 for patches required to add this function to systems prior to Windows 8.1. Restricted Admin mode for Remote Desktop Connections can be implemented for each session using a command line switch to start the Remote Desktop Client or through a group policy to enable it for all sessions. The command line to do this is "mstsc /restrictedadmin". To enable this with group policy, configure the policy value for Computer Configuration >> Administrative Templates >> System >> Credentials Delegation >> "Restrict delegation of credentials to remote servers" to "Enabled". |