[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Allow Remote Desktop exception - Domain Profile

ID: oval:gov.nist.USGCB.xpfirewall:def:5007Date: (C)2012-04-13   (M)2017-07-28
Class: COMPLIANCEFamily: windows




Many organizations use Remote Desktop connections in their normal troubleshooting procedures or operations. However, some attacks have occurred that exploited the ports typically used by Remote Desktop. To provide flexibility for remote administration, the Windows Firewall: Allow Remote Desktop exception setting is available. Enabling this setting configures Windows Firewall to open TCP port 3389 for inbound connections. You must also specify the IP addresses or subnets from which these incoming messages are allowed. If you disable this policy setting, Windows Firewall blocks this port and prevents the computer from receiving Remote Desktop requests. If an administrator attempts to open this port by adding it to a local port exceptions list, Windows Firewall does not open the port. Some attacks can exploit an open port 3389. To maintain the enhanced management capabilities provided by Remote Desktop, you should configure this setting to Enabled and specify the IP addresses and subnets of the computers used for remote administration. Computers in your environment should accept Remote Desktop requests from as few computers as possible.

Platform:
Microsoft Windows XP
Reference:
CCE-3304-3
CPE    2
cpe:/o:microsoft:windows_xp
cpe:/o:microsoft:windows_xp::sp2
CCE    1
CCE-3304-3
XCCDF    5
xccdf_gov.nist_benchmark_USGCB-Windows-XP-firewall
xccdf_org.secpod_benchmark_nist_windows_xp
xccdf_org.secpod_benchmark_nerc_cip_Windows_XP
xccdf_org.secpod_benchmark_hipaa_windows_xp
...

© 2013 SecPod Technologies