[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Deny log on through Remote Desktop Services

ID: oval:org.secpod.oval:def:18942Date: (C)2014-05-29   (M)2017-11-21
Class: COMPLIANCEFamily: windows




The Deny log on through Remote Desktop Services user right should be assigned to the appropriate accounts. This policy setting determines whether users can log on as Terminal Services clients. After the baseline member server is joined to a domain environment, there is no need to use local accounts to access the server from the network. Domain accounts can access the server for administration and end-user processing. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on through Remote Desktop Services (2) REG: NO INFO

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10878-7
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10878-7
XCCDF    4
xccdf_org.secpod_benchmark_NIST_800_53_r4_Windows_2008_R2
xccdf_org.secpod_benchmark_PCI_3_2_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_general_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2008_R2
...

© 2013 SecPod Technologies