UCF STIG Viewer Logo

The system must be configured to hide the computer from the browse list.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14231 WN08-SO-000040 SV-48170r2_rule ECSC-1 Low
Description
Identifying the computer name on a network could provide an attacker with information useful in gaining access. This setting prevents the computer name from displaying in the browse list.
STIG Date
Windows 8/8.1 Security Technical Implementation Guide 2018-02-12

Details

Check Text ( C-44870r1_chk )
Analyze the system using the Security Configuration and Analysis snap-in. (See "Performing Analysis with the Security Configuration and Analysis Snap-in" in the STIG Overview document.)
Expand the Security Configuration and Analysis tree view.
Navigate to Local Policies -> Security Options.

(See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)

If the value for "MSS: (Hidden) Hide Computer From the Browse List (not recommended except for highly secure environments)" is not set to "Enabled", this is a finding.

The policy referenced configures the following registry value:

Registry Hive: HKEY_LOCAL_MACHINE
Subkey: \System\CurrentControlSet\Services\Lanmanserver\Parameters\

Value Name: Hidden

Value Type: REG_DWORD
Value: 1
Fix Text (F-41308r1_fix)
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (Hidden) Hide Computer From the Browse List (not recommended except for highly secure environments)" to "Enabled".