[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98250

 
 

909

 
 

79281

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-46771-2

Platform: win2016Date: (C)2017-08-03   (M)2017-10-16



"Do not allow drive redirection" This policy setting prevents users from sharing the local drives on their client computers to Terminal Servers that they access. Mapped drives appear in the session folder tree in Windows Explorer in the following format: \\TSClient\<driveletter>$ If local drives are shared they are left vulnerable to intruders who want to exploit the data that is stored on them. Vulnerability: Data could be forwarded from the user's Terminal Server session to the user's local computer without any direct user interaction. Counter Measure: Configure the Do not allow drive redirection setting to Enabled. Potential Impact: Drive redirection will not be possible.


Parameter: fDisableCdm


Technical Mechanism: Fix: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection (2) REG: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services!fDisableCdm

References:

Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:40318


OVAL    1
oval:org.secpod.oval:def:40318
XCCDF    3
xccdf_org.secpod_benchmark_general_Windows_Server_2016
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2016
xccdf_org.secpod_benchmark_PCI_3_2_Windows_Server_2016

© 2013 SecPod Technologies