[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-3438-9

Platform: win2k3Date: (C)2010-04-20   (M)2017-07-31



The "deny logon through Terminal Services" user right should be assigned to the correct accounts.


Parameter: (1) set of accounts


Technical Mechanism: (1) defined the SeDenyRemoteInteractiveLogonRight setting in by Local or Group Policy (2) Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on through Terminal Services

References:

Resource IdReference
Old v4 CCE IDCCE-108
Microsoft Security Guide for Windows Server 2003Table 4.18 Deny log on through Terminal Services: Built-in Administrator; all NON-operating system service accounts (Legacy Client, Enterprise Client, and High Security)
Center for Internet Security Windows Server 20034.2.19 Deny logon through Terminal Services: Not Defined
DISA Stig for Windows 20035.1 User Rights: (4.041: CAT II) The Everyone group is assigned the right to deny logon through Terminal Services unless the machine is performing the roale of a Terminal Server, then the Guests group is assigned
Microsoft Windows Server 2003 Security Guide, version April 26, 2006User Rights Assignments Setting Recommendations: Deny logon through Terminal Services, Guests (Legacy, Enterprise, and Specialized Security) Table 4.30 Manually Added User Rights Assignments: Deny log on through Terminal Services, Built-in Administrator; Guests; Support_388945a0; Guest ; all NON-operating system service accounts (Legacy, Enterprise, and Specialized Security) Table 5.8 Manually Added User Rights Assignments: Deny log on through Terminal Services, Built-in Administrator; all NON-operating system service accounts (Legacy, Enterprise, and Specialized Security)
Microsoft Online Documentationhttp://technet.microsoft.com/en-us/library/cc737453.aspx
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:10079
BITS Shared Assessments SIG v6.0BITS Shared Assessments SIG v6.0
Jericho ForumJericho Forum
HIPAA/HITECH ActHIPAA/HITECH Act
FedRAMP Security Controls(Final Release Jan 2012)--LOW IMPACT LEVEL--FedRAMP Security Controls(Final Release Jan 2012)--LOW IMPACT LEVEL--
ISO/IEC 27001-2005ISO/IEC 27001-2005
COBIT 4.1COBIT 4.1
GAPP (Aug 2009)GAPP (Aug 2009)
NERC CIPNERC CIP
NIST SP800-53 R3NIST SP800-53 R3 AC-3
NIST SP800-53 R3NIST SP800-53 R3 CM-6
PCIDSS v2.0PCIDSS v2.0
FedRAMP Security Controls(Final Release Jan 2012)--MODERATE IMPACT LEVEL--FedRAMP Security Controls(Final Release Jan 2012)--MODERATE IMPACT LEVEL--
BITS Shared Assessments AUP v5.0BITS Shared Assessments AUP v5.0


CPE    13
cpe:/o:microsoft:windows_server_2003::gold:itanium
cpe:/o:microsoft:windows_server_2003::sp1:x86
cpe:/o:microsoft:windows_server_2003::gold:x86
cpe:/o:microsoft:windows_server_2003::sp2:x86
...
OVAL    1
oval:org.secpod.oval:def:10079
XCCDF    4
xccdf_org.secpod_benchmark_cip_std_ver3_Windows_2003
xccdf_nist_benchmark_Windows_server_2003
xccdf_hipaa_benchmark_Windows__server_2003
xccdf_org.secpod_benchmark_Windows_2003
...

© 2013 SecPod Technologies